There’s a lot of noise out there! Some vendors will argue how their silver-bullet access control or other security feature should be the core of your enterprise’s cloud data security strategy. As a data owner or architect who probably isn’t a security expert, it can be hard for you to separate signal from noise and figure out how to design security into your overall cloud data architecture, without getting hoodwinked by their parochial view of the world. The reality is that the typical enterprise has diverse datasets and workloads with varying sensitivity and associated risks, which is why TrustLogix has delivered a platform that offers a combination of capabilities and allows you to choose the optimal data security features for each use case.
Most of the major cloud data vendors such as Snowflake, Databricks, AWS and others now embrace a variety of data workloads running on their platforms. These include data applications, data science and machine learning, data sharing and collaboration, and of course traditional business intelligence has always been there. Indeed, this diversity is partly why you moved to the Cloud, because it is easier to implement new types of data projects and share data across them. And with new innovations regularly being brought to market by these vendors, you will never be “done” with your cloud data journey.
Meanwhile there are multiple methods of controlling data access. Role based access controls (RBAC) grant access based on a user’s role, e.g. are they in sales, marketing, finance and so forth. Attribute based access controls (ABAC) grant access based on user attributes that can change over time, such as what region they are in, which customer or partner accounts they own, are they a company insider or not, etc. Attributes can be dynamic, such as looking them up in your HR system, so you can ensure access privileges are always current. Additionally, the data itself can be classified and tagged as sensitive, with access policies then applied based on their classification tags. Finally, these policies can be templatized, based on corporate-wide standards or regulations such as GDPR.
Some vendors will claim one or the other is categorically better, either because of performance, or because of ease of managing them, or whatever the reason. The reality is each has pros and cons, depending on workload characteristics and user behaviors.
RBAC is particularly well-suited for these use cases:
Example of role-based object-level policy with future grants, and its SQL statements generated by TrustLogix.
In general, RBAC serves well when the native platform is built using the RBAC engine and there are no complex data access requirements. Furthermore, the RBAC model helps enterprises meet regulatory requirements such as HIPAA, SOX, SOC2, and ISO 27001 easily, as this depends on visibility to prove the information is handled according to security and confidentiality standards defined by the job role of the user in the enterprise. But RBAC does not scale when the requirements are dynamic in nature, customers end up creating a role per business requirement and that leads to role explosion. ABAC is a more flexible and extensible model to handle the dynamic real-time nature of such authorization.
Some of the use cases where ABAC is most applicable:
These attributes are subject to frequent change and require looking up the data itself to determine whether the user can access or not.
Example of tag-based ABAC policy, displayed in TrustLogix policy editor.
While ABAC can be used to achieve all of the above-mentioned RBAC use cases, ABAC can have more operational overhead and thus can be overkill for those use cases. Furthermore, role itself can be used as an attribute in many scenarios in ABAC. So, RBAC and ABAC are not mutually exclusive, and they should be leveraged together.
In short, there is no one right method to control access for all data projects. Anybody claiming one is categorically always better than the other is just contributing to the noise. In principle, you should select a data security platform whose access control capabilities are as diverse as the data workloads you are trying to secure, thus empowering you to make the best choices of access control method for each use case involving sensitive data.
As a general good practice, TrustLogix recommends starting with securing some critical assets by leveraging the power of both RBAC and ABAC. However, you still need to continuously ensure those policies are optimally protecting your data, and you have addressed all gaps in your data security posture. Even with the best access control technology, there are numerous types of data access issues that can go undetected, including:
TrustLogix Data Risk Viewer, showing example risks and recommendations.
Just having an access control system in place won’t, by itself, look out for such issues. Security Observability, which identifies these issues and enables quick resolution, is critical to ensuring your policies are optimal and easily maintained. Also, most data privacy regulations, such as GDPR, require that you have a way of getting visibility and control of such issues. As a result, “Data Security Posture Management” is becoming its own product category (as defined by Gartner), out of recognition that real-time visibility and control across the entire cloud data landscape is critical.
In short, simply having RBAC and/or ABAC capability is not enough. You should also make sure you have a way of monitoring for a broad spectrum of data security risks, and can enable quick resolution regardless of where that risk originated. In “Break the Glass” in case of kinds of emergency scenarios, a risk-adaptable access control is also required, hence understanding risks is a critical aspect of data security access governance.
LEARN MORE about the 7 types of data security issues here: https://www.trustlogix.io/blog/the-top-7-cloud-data-security-issues-that-you-dont-know-about.
In conclusion, your cloud data landscape:
As a result, don’t be hoodwinked by the noise of silver-bullet features promising to solve for this. Instead, consider that RBAC, ABAC, and security observability are all important for maintaining a strong data security posture in the cloud.