You have 3 free guides left 😟
Unlock your guides
You have 3 free guides left 😟
Unlock your guides

12.3 Data Security and Privacy in Cloud BI

3 min readjuly 18, 2024

Cloud BI brings powerful data analysis capabilities, but also raises security and privacy concerns. From to , organizations must navigate a complex landscape of risks when leveraging cloud-based business intelligence solutions.

The is key to understanding security in cloud BI. While providers secure the infrastructure, customers must protect their data and applications. , , and compliance measures are essential for safeguarding sensitive information in the cloud.

Data Security and Privacy in Cloud BI

Key security and privacy concerns

Top images from around the web for Key security and privacy concerns
Top images from around the web for Key security and privacy concerns
  • Data breaches and
    • due to misconfigured cloud services (unsecured S3 buckets)
    • from cloud service provider employees with privileged access
  • Data loss and
    • Accidental deletion or modification of data by users or administrators
    • Hardware failures or natural disasters (earthquakes, floods) affecting cloud infrastructure
  • and control over data
    • Difficulty in monitoring data access and usage across multiple cloud services
    • Limited ability to enforce company-specific security policies in shared cloud environments
  • Compliance and regulatory challenges
    • Ensuring adherence to industry-specific regulations ( for healthcare, for personal data)
    • Maintaining and restrictions (EU-US Privacy Shield)

Shared responsibility model

  • Division of security responsibilities between the cloud service provider and the customer
    • Cloud service provider secures the underlying infrastructure and services
      • Physical security of data centers (access controls, surveillance)
      • Network security and access controls (, intrusion detection)
      • Patching and updating of cloud infrastructure (operating systems, virtualization)
    • Customer responsible for securing their data and applications
      • Configuring access controls and permissions (user roles, privileges)
      • Encrypting sensitive data (at rest and in transit)
      • Monitoring user activity and data access (, )
  • Importance of understanding the specific responsibilities for each cloud service model
    • Infrastructure as a Service (IaaS) gives customer more control and responsibility (Amazon EC2)
    • Platform as a Service (PaaS) involves shared responsibility between provider and customer (Microsoft Azure)
    • Software as a Service (SaaS) has provider handling most security aspects, customer manages user access (Salesforce)

Encryption and access controls

    • Protects data confidentiality and integrity
      1. Encrypts (stored in the cloud)
      2. Encrypts (during transmission)
    • Mitigates risks associated with unauthorized access or data breaches
    • Ensures compliance with regulatory requirements (HIPAA, PCI DSS)
  • Access controls
    • Implement strong authentication mechanisms
      • (MFA) using tokens or biometrics
      • (SSO) for centralized access management across applications
    • Apply granular access permissions
      • (RBAC) to assign permissions based on job functions
      • to grant only necessary access rights
    • Monitor and audit user activity
      • Detect and investigate suspicious access attempts (brute-force attacks)
      • Maintain audit logs for compliance and forensic purposes (user actions, timestamps)

Compliance and regulations

  • Industry-specific regulations
    • (HIPAA) for protecting healthcare data
    • (PCI DSS) for securing financial transactions
    • (GDPR) for safeguarding personal data of EU citizens
  • Data sovereignty and localization requirements
    • Ensuring data is stored and processed in specific geographic locations ()
    • Complying with country-specific data protection laws ()
  • Conducting regular
    • Assessing the effectiveness of security controls (, )
    • Identifying and addressing gaps in compliance (remediation plans, risk assessments)
  • Obtaining relevant certifications and attestations
    • (Service Organization Control 2) for demonstrating security, availability, and confidentiality
    • for implementing an information security management system (ISMS)
© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.


© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.

© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.
Glossary
Glossary