How to control data-related information security risks in a company with a micro-service architecture? First of all, it is necessary to understand the classification of sensitive data and understand what risks each type of data carries.
We will discuss current issues in the organisation related to the use of sensitive data in the company's systems and their storage for use. We will discuss tools and approaches that can help with the organisation of processes for working with sensitive and non-sensitive data.
In conclusion, we will analyse an approach of creating a real-time data monitoring service. This service will help in keeping up-to-date documentation on dataflow, data producers, their quality and their security. Using the example of an abstract company, we will understand the methodology of implementing approaches and tools that we will discuss earlier.
Key takeaways:- Knowledge about the classification of critical data.
- Information about current data-related issues.
- Ensuring critical data security in the fast-growing micro-service architecture of the company.
- A method for the real-time detection of critical data within the infrastructure and the assessment of their feasibility for use in a specific system.
- Using machine learning to solve the problem of identifying customers' personal data.
- A methodology for constructing a system to monitor interactions with critical data.