AST June 2018 Magazine Volume 24 | Page 85

with other 24 security Volume tools and data pro- tection strategies. June 2018 Edition Below are some questions to an- swer: • Who has access to what data? • Who has controls over database ac- cess? • What regula- tions/laws do I need to comply with? • Is my data secure in transit? • Is my data secure when it’s not in use? • What sensitive data does my organization store, use and transmit? Gaining insights into your business-crit- ical applications allows your security team to be proactive in detecting, in- vestigating, mitigating and remediat- 2) Monitor your cloud applications ing security incidents. After you have found where your most sensitive data resides, monitor who is ac- Monitoring technology will provide cessing it and what they are doing with your organization with the ability to trust your employees but verify that it. they are not violating your acceptable With the growth of cloud-based apps such as use policies and putting your organiza- Salesforce, company data is oftentimes easily tion at risk. accessible within the application. Defending against insider threats requires monitoring user activity and using behavior analytics that provide insights into where, when and what insiders are doing. So then, say that an employee on the brink of de- parture is exporting large amounts of company data from Salesforce. Your security team can isolate the incident and prevent data loss or even a full-blown breach. 83