There’s a lot of noise out there! Some vendors will argue that their silver-bullet access control or other security features should be the core of your enterprise’s cloud data security strategy. As a data owner or architect who probably isn’t a security expert, it can be hard to separate signal from noise and figure out how to design security into your overall cloud data architecture without getting hoodwinked by their parochial view of the world. The typical enterprise has diverse datasets and workloads with varying sensitivity and associated risks, which is why TrustLogix has delivered a platform that offers a combination of capabilities and allows you to choose the optimal data security features for each use case.
Most of the major cloud data vendors such as Snowflake, Databricks, AWS and others now embrace a variety of data workloads running on their platforms. These include data applications, data science and machine learning, data sharing and collaboration, and, of course, traditional business intelligence has always been there. Indeed, this diversity is partly why you moved to the cloud: it is easier to implement new types of data projects and share data across them. And with innovations regularly being brought to market by these vendors, you will never be “done” with your cloud data journey.
Meanwhile, there are multiple methods of controlling data access. Role-based access controls (RBAC) grant access based on a user’s role, e.g. are they in sales, marketing, finance, and so forth. Attribute-based access controls (ABAC) grant access based on user attributes that can change over time, such as what region they are in, which customer or partner accounts they own, are they a company insider or not, etc. Attributes can be dynamic, such as looking them up in your HR system, so you can ensure access privileges are always current. Additionally, the data itself can be classified and tagged as sensitive, with access policies then applied based on their classification tags. Finally, these policies can be templatized based on corporate-wide standards or regulations such as GDPR.
Some vendors will claim one or the other is categorically better, either because of performance, or because of ease of managing them, or whatever the reason. The reality is each has pros and cons, depending on workload characteristics and user behaviors.
RBAC is particularly well-suited for these use cases:
Example of role-based object-level policy with future grants and its SQL statements generated by TrustLogix.
In general, RBAC serves well when the native platform is built using the RBAC engine, and there are no complex data access requirements. Furthermore, the RBAC model helps enterprises meet regulatory requirements such as HIPAA, SOX, SOC2, and ISO 27001, as this depends on visibility to prove the information is handled according to security and confidentiality standards defined by the user's job role in the enterprise. But RBAC does not scale when the requirements are dynamic in nature; customers end up creating a role per business requirement, and that leads to role explosion. ABAC is a more flexible and extensible model that can handle the dynamic real-time nature of such authorization.
Some of the use cases where ABAC is most applicable:
These attributes are subject to frequent change and require looking up the data itself to determine whether the user can access or not.
Example of tag-based ABAC policy displayed in TrustLogix policy editor.
While ABAC can be used to achieve all of the above-mentioned RBAC use cases, ABAC can have more operational overhead and thus can be overkill for those use cases. Furthermore, role itself can be used as an attribute in many scenarios in ABAC. So, RBAC and ABAC are not mutually exclusive. They should be leveraged together.
In short, no one correct method exists to control access for all data projects. Anybody claiming one is categorically always better than the other is just contributing to the noise. In principle, you should select a data security platform whose access control capabilities are as diverse as the data workloads you are trying to secure, thus empowering you to make the best choices of access control method for each use case involving sensitive data.
As a general good practice, TrustLogix recommends starting with securing some critical assets by leveraging the power of both RBAC and ABAC. However, you still need to ensure those policies are optimally protecting your data continuously and that you have addressed all gaps in your data security posture. Even with the best access control technology, there are numerous types of data access issues that can go undetected, including:
TrustLogix Data Risk Viewer showing example risks and recommendations.
Just having an access control system in place won’t, by itself, identify such issues. Security Observability, which identifies these issues and enables quick resolution, is critical to ensuring your policies are optimal and easily maintained. Also, most data privacy regulations, such as GDPR, require that you have a way of getting visibility and controlling such issues. As a result, “Data Security Posture Management” is becoming its own product category (as defined by Gartner) out of recognition that real-time visibility and control across the entire cloud data landscape is critical.
In short, simply having RBAC and/or ABAC capability is not enough. You should also make sure you can monitor a broad spectrum of data security risks and that you can enable quick resolution regardless of where that risk originated. In “Break the Glass” case of kinds of emergency scenarios, risk-adaptable access control is also required, hence understanding risks is a critical aspect of data security access governance.
LEARN MORE about the 7 types of data security issues here: https://www.trustlogix.io/blog/the-top-7-cloud-data-security-issues-that-you-dont-know-about.
In conclusion, your cloud data landscape:
As a result, don’t be hoodwinked by the noise of silver-bullet features promising to solve this. Instead, consider that RBAC, ABAC, and security observability are all essential for maintaining a strong data security posture in the cloud.