Related Posts
小型企业选择门禁控制系统的 7 大标准
中小企业访问系统评估详解, 从成本和安全性,到支持和扩展性。
Data privacy is central to every organization and balancing that against securing your customers’ personal data is one of the highest priorities of your information security team. This isn’t just true for highly regulated industries like healthcare or finance, but for every company that processes personal information. Directives like the European General Data Protection Regulation (GDPR) have set minimum privacy and data security standards. It’s vital for both your users and your business to understand the implications of data privacy, especially when securing sensitive data in cloud environments.
As businesses and consumers move increasingly to SaaS applications and data, it’s worth exploring the roles, responsibilities, and expectations for data privacy and who provides it. This comes down to two fundamental questions:
We can divide the responsibilities into four key areas:
In a typical public cloud ecosystem, responsibilities follow a “shared security responsibility” model. One of the main principles of this model is that you are always responsible for securing what’s under your direct control.
End-User Security and Privacy Responsibilities
The end-user is responsible for:
SaaS Customer Security and Privacy Responsibilities
The SaaS customer is responsible for:
SaaS Provider Security and Privacy Responsibilities
The SaaS provider is responsible for:
Cloud Infrastructure Provider Security and Privacy Responsibilities
The cloud infrastructure provider is responsible for:
It’s essential to have a Zero Trust security model. Despite the shared security responsibilities, each party must have rigorous controls to ensure they meet their obligations.
Here are some important considerations for managing data privacy:
*note that this list isn’t exhaustive but that it includes essential components to consider
Data protection regulations will continue to evolve. As a SaaS provider, we believe that it’s better to take a firm stance on data protection now to ensure compliance in the future by continuously challenging and improving the status quo. This includes implementing region-specific platforms and a comprehensive encryption architecture from the very early stages of design.
This expands into end-to-end encrypted data and confidential computing — and the confidence that personal data is always protected: at rest, in transit and during processing. Public cloud providers realize the importance of this too by offering solutions to support data privacy. Here are some examples of well-known provider solutions:
Whatever the future of data protection and privacy brings, we’re ready to protect your business and user data and ensure that privacy is maintained.
Wadiha El Batti is a Senior Product Owner for the Authentication Platform within Identity and Access Management (IAM) at HID Global. She has 20 years of experience in IT Security and more particularly authentication products. Wadiha has significant experience within Engineering and is highly technically skilled. She started her career as a developer and software architect and then evolved to being responsible for managing international delivery engineering teams. Wadiha managed the project which transformed our authentication platform offering by adding a multi-tenant Authentication SaaS.