SlideShare a Scribd company logo
Protecting sensitivepersonal
data in the enterprise
Powered by TCSAWS business unit
24 August2021
RajiKrishnamoorthy
Head, AWS Security and Compliance
AWS Business Unit, TCS
2
Challenges in protecting PII data on cloud
*Source: Cyware.com
Nearly 80-90% of the data breaches involve personally identifiable
information (PII); ransomwareattackswitnessed a rise of 57%.*
Enterprises storing PII data on the cloud need to secure data at
rest and in transit from intruders. They needto:
• Set-upcomplex monitoringsystemsto identifyandthwart
maliciousor unauthorizedaccess
• Track complex and sensitive dataexchangesforsource,
structure, quality,lineage andusage
• Ensure compliance to global privacyregulations
• Choose a combinationof native servicesand third-partytools
to protect data
3
Five critical aspects for protecting PII
Data classification
Leveragedata classification toolsandpre-defined criteria
to categorizedata
Data security controls
Protectdata and infrastructurewith in-builtfraud
detection controls
Data encryption
Cipher dataatrestandinmotion makingdata
unintelligibleto eavesdroppers
Data loss prevention
Preventdata loss,leakageor misuseof datathrough
breaches,ex-filtration transmissions andunauthorized use
Regulatory compliance
Equip organizationsto continueoperationsandmeet
obligationsdespitedisruption
In a world of ever-increasing
compliance andprivacyconcerns,
building PII guardrails helps enterprises
uphold customertrust and adhere to
regulatory standards. We recommenda
five-foldapproachto build guardrails
forenterprise PII data.
4
Data classification | First step to protect PII data
TCS Confidential
Categorize data basedon predefined
criteria to efficientlymanage and
protect data
Combine manual and automated
techniquesto optimallyclassifydata
Leverage cloud service providersto
search for storage volumesand match
data against pre-definedpatterns
Implementthe right securitymeasures
based on data sensitivityusing
data classificationstools
5
Data security controls | Using domain and configurability
TCS Confidential
Applythe rightidentityand access
management(IAM) mechanisms to manage
and log accesses across users and groups
Detect unauthorizedtrafficproactively,
monitor deviationinconfigurationand
facilitate auditsof databases
Secure cloud environmentsagainstattacks
such as distributeddenial of service,prevent
threats to applicationlayerand bring-in
secure networksegmentation
Enable layeringof multiple controlsfor
securityredundancy and eliminate single
pointsecurity failure
6
Data encryption | Making PII data indecipherable
TCS Confidential
• Enforcesecurity measures that comply
with dataprivacy laws
• Prevent datafrombeing manipulated
by unauthorizedusers
• Protect databoth at rest and in transit
• File/folder encryption
• Full-disk encryption for cloud workload
storagevolumes
• Specialized encryption (database,email)
• Cloud-nativestorageencryption
• Encrypting the data before transmission;
authenticatingtheendpoints;and
decryptingand verifyingthe data on
arrival
Data at rest Data intransit
7
Data loss prevention | Prevent PII data leakage
TCS Confidential
Classify PII databased on natureof business and
regulatory standards
Implement monitoringatthe boundary of network
egress,on all internetdevices
Install a data lossprevention (DLP) agent on hosts
that process production data
Enforce security policies rules -- based on the
content and context of the data classification --
when certain types of data is accessed or leaked
8
Regulatory compliance | Establish user trust
TCS Confidential
Assessthe regulatoryrisks by identifying
the gaps inthe existingsecuritysetup
Enforce securitypoliciesto meetthe
compliance requirements
Buildauto-remediationcompliance
capabilities
Remediate the identifiedweaknessbased
on the risk assessment
9
The combined synergy of TCS Cloud Foundation Designer and
AWS Security Services
TCS Confidential
• PII data security design
patternsfor five elements of
sensitive user information
• 40% reduced efforts to build
security guardrails
• Aligned with AWS well-
architectedframework
principles
• Compliant with Center for
Internet Security (CIS) AWS
foundation benchmark
• Role-based access control to
workloads on AWS cloud
• Advanced encryption
engines
• End-to-end, AI-driven data
protection
Amazon Macie AWS IAM AWS KMS AWS Security Hub AWS Certificate
Manager (ACM)
AWS CloudHSM
AWS Secrets
Manager
AWS Shield
10
A quick recap on protecting PII data
TCS Confidential
Protectingdata onAWScloudis easier witha host of security services at
organization’s disposal
MonitoringPII data access andstorage canbe achievedusinga combination
of AWS-native security services,AI services andthird-party tools
Compliance to industry standards is paramount to continue business and
privacy assurance to customers
Building security foundations forAWScloudis supportedby an
automatedparadigm
By minimizing storage anduse of PII,enterprises cansignificantly reduce the
risk for data breaches andmisuse of data,andlower compliance costs.
Thank you
Copyright © 2021 Tata ConsultancyServices Limited
TCS Confidential
Write to us @ BusinessAndTechnologyServices.Marketing@TCS.COM
to know more about protectingPII data

More Related Content

PPTX
Data Loss Prevention
PPTX
‏‏‏‏‏‏Chapter 10: Document and Content Management
PDF
Forcepoint Dynamic Data Protection
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Intrusion Detection Systems (IDS)
PDF
Data Stewards – Defining and Assigning
PPT
Data loss prevention (dlp)
PPTX
Sensitive Data Exposure
Data Loss Prevention
‏‏‏‏‏‏Chapter 10: Document and Content Management
Forcepoint Dynamic Data Protection
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Intrusion Detection Systems (IDS)
Data Stewards – Defining and Assigning
Data loss prevention (dlp)
Sensitive Data Exposure

What's hot (20)

PPTX
Data Governance Initiative
PPT
5 Myths About Data Loss Prevention
PDF
Cybersecurity Awareness Training Presentation v1.0
PPT
Anti-Forensics: Real world identification, analysis and prevention
PDF
Overview of Data Loss Prevention (DLP) Technology
PPSX
Cloud Forensics
PDF
GDPR Basics - General Data Protection Regulation
PDF
Practical IT auditing
PPTX
GDPR Presentation slides
PDF
Personal Data Protection in Indonesia
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PPTX
CompTIA Security+.pptx
PDF
DLP Data leak prevention
PPTX
Data Governance_Notes.pptx
PPT
Information security
PDF
Machine Learning Based Botnet Detection
PPT
Data governance
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
Common Practice in Data Privacy Program Management
PPTX
Introduction to DCAM, the Data Management Capability Assessment Model
Data Governance Initiative
5 Myths About Data Loss Prevention
Cybersecurity Awareness Training Presentation v1.0
Anti-Forensics: Real world identification, analysis and prevention
Overview of Data Loss Prevention (DLP) Technology
Cloud Forensics
GDPR Basics - General Data Protection Regulation
Practical IT auditing
GDPR Presentation slides
Personal Data Protection in Indonesia
Cybersecurity Awareness E-Book - WeSecureApp
CompTIA Security+.pptx
DLP Data leak prevention
Data Governance_Notes.pptx
Information security
Machine Learning Based Botnet Detection
Data governance
DATA LOSS PREVENTION OVERVIEW
Common Practice in Data Privacy Program Management
Introduction to DCAM, the Data Management Capability Assessment Model
Ad

Similar to Protecting Sensitive Personal Data in the Enterprise (20)

PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PDF
Seven steps for improving cloud security with business integration
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PDF
How to Build a Secure IT Infrastructure in 2025.
PDF
Security Considerations When Using Cloud Infrastructure Services.pdf
PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PPTX
Extending security in the cloud network box - v4
PDF
How the latest trends in data security can help your data protection strategy...
PPTX
dlp-sales-play-sales-customer-deck-2022.pptx
PPTX
Practical Security for the Cloud
PPTX
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
PPTX
Azure Fundamentals Part 3
 
PDF
How We Protect Our Business in the Cloud (The Smart Way)
DOCX
Why Cloud Penetration Testing Essential
PDF
Ensuring Secure and Permission-Aware RAG Deployments
PDF
SECURING THE CLOUD DATA LAKES
PDF
Will your cloud be compliant
PDF
Cloud security snippets on the use case of the cloud
PPTX
Mastering Cloud Infrastructure and Entitlements Management
PPTX
Cloud computing
Cloud data governance, risk management and compliance ny metro joint cyber...
Seven steps for improving cloud security with business integration
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
How to Build a Secure IT Infrastructure in 2025.
Security Considerations When Using Cloud Infrastructure Services.pdf
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Extending security in the cloud network box - v4
How the latest trends in data security can help your data protection strategy...
dlp-sales-play-sales-customer-deck-2022.pptx
Practical Security for the Cloud
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
Azure Fundamentals Part 3
 
How We Protect Our Business in the Cloud (The Smart Way)
Why Cloud Penetration Testing Essential
Ensuring Secure and Permission-Aware RAG Deployments
SECURING THE CLOUD DATA LAKES
Will your cloud be compliant
Cloud security snippets on the use case of the cloud
Mastering Cloud Infrastructure and Entitlements Management
Cloud computing
Ad

More from Tata Consultancy Services (20)

PDF
TCS AI for Business Study – Key Findings
PDF
TCS Survey: The future of operations
PDF
TCS Global Cloud Study – Key Findings
PDF
TCS Global Cloud Study – North America
PDF
TCS Global Cloud Study – Continental Europe
PDF
TCS Global Cloud Study – United Kingdom & Ireland
PDF
TCS Global Cloud Study – Asia-Pacific
PDF
TCS Retail Consumer Survey: US Key Findings Report
PDF
TCS Retail Consumer Survey: UK Key Findings Report
PDF
Make risk and cybersecurity a boardroom agenda
PDF
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
PDF
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
PDF
TCS 2021 Global Leadership Study: Key Findings Report
PDF
Leadership in the digital era: new mandates, mindsets, and mind melts
PDF
The digital capabilities of the most resilient retailers
PDF
Mastering the Post-Pandemic Logistics Revolution
PDF
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
PDF
Today’s Digital Imperatives Demand C-Suite Reinvention
PDF
A new CMO role: leveraging an organization’s purpose for strategic advantage
PDF
Digital Readiness and the Pandemic: Assessing the Impact
TCS AI for Business Study – Key Findings
TCS Survey: The future of operations
TCS Global Cloud Study – Key Findings
TCS Global Cloud Study – North America
TCS Global Cloud Study – Continental Europe
TCS Global Cloud Study – United Kingdom & Ireland
TCS Global Cloud Study – Asia-Pacific
TCS Retail Consumer Survey: US Key Findings Report
TCS Retail Consumer Survey: UK Key Findings Report
Make risk and cybersecurity a boardroom agenda
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Leadership Study: Key Findings Report
Leadership in the digital era: new mandates, mindsets, and mind melts
The digital capabilities of the most resilient retailers
Mastering the Post-Pandemic Logistics Revolution
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
Today’s Digital Imperatives Demand C-Suite Reinvention
A new CMO role: leveraging an organization’s purpose for strategic advantage
Digital Readiness and the Pandemic: Assessing the Impact

Recently uploaded (20)

PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
IFRS Notes in your pocket for study all the time
PPTX
5 Stages of group development guide.pptx
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
DOCX
Business Management - unit 1 and 2
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
How to Get Funding for Your Trucking Business
PPT
Chapter four Project-Preparation material
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Euro SEO Services 1st 3 General Updates.docx
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Reconciliation AND MEMORANDUM RECONCILATION
IFRS Notes in your pocket for study all the time
5 Stages of group development guide.pptx
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
New Microsoft PowerPoint Presentation - Copy.pptx
unit 1 COST ACCOUNTING AND COST SHEET
Nidhal Samdaie CV - International Business Consultant
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Business Management - unit 1 and 2
Deliverable file - Regulatory guideline analysis.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
How to Get Funding for Your Trucking Business
Chapter four Project-Preparation material
ICG2025_ICG 6th steering committee 30-8-24.pptx
COST SHEET- Tender and Quotation unit 2.pdf

Protecting Sensitive Personal Data in the Enterprise

  • 1. Protecting sensitivepersonal data in the enterprise Powered by TCSAWS business unit 24 August2021 RajiKrishnamoorthy Head, AWS Security and Compliance AWS Business Unit, TCS
  • 2. 2 Challenges in protecting PII data on cloud *Source: Cyware.com Nearly 80-90% of the data breaches involve personally identifiable information (PII); ransomwareattackswitnessed a rise of 57%.* Enterprises storing PII data on the cloud need to secure data at rest and in transit from intruders. They needto: • Set-upcomplex monitoringsystemsto identifyandthwart maliciousor unauthorizedaccess • Track complex and sensitive dataexchangesforsource, structure, quality,lineage andusage • Ensure compliance to global privacyregulations • Choose a combinationof native servicesand third-partytools to protect data
  • 3. 3 Five critical aspects for protecting PII Data classification Leveragedata classification toolsandpre-defined criteria to categorizedata Data security controls Protectdata and infrastructurewith in-builtfraud detection controls Data encryption Cipher dataatrestandinmotion makingdata unintelligibleto eavesdroppers Data loss prevention Preventdata loss,leakageor misuseof datathrough breaches,ex-filtration transmissions andunauthorized use Regulatory compliance Equip organizationsto continueoperationsandmeet obligationsdespitedisruption In a world of ever-increasing compliance andprivacyconcerns, building PII guardrails helps enterprises uphold customertrust and adhere to regulatory standards. We recommenda five-foldapproachto build guardrails forenterprise PII data.
  • 4. 4 Data classification | First step to protect PII data TCS Confidential Categorize data basedon predefined criteria to efficientlymanage and protect data Combine manual and automated techniquesto optimallyclassifydata Leverage cloud service providersto search for storage volumesand match data against pre-definedpatterns Implementthe right securitymeasures based on data sensitivityusing data classificationstools
  • 5. 5 Data security controls | Using domain and configurability TCS Confidential Applythe rightidentityand access management(IAM) mechanisms to manage and log accesses across users and groups Detect unauthorizedtrafficproactively, monitor deviationinconfigurationand facilitate auditsof databases Secure cloud environmentsagainstattacks such as distributeddenial of service,prevent threats to applicationlayerand bring-in secure networksegmentation Enable layeringof multiple controlsfor securityredundancy and eliminate single pointsecurity failure
  • 6. 6 Data encryption | Making PII data indecipherable TCS Confidential • Enforcesecurity measures that comply with dataprivacy laws • Prevent datafrombeing manipulated by unauthorizedusers • Protect databoth at rest and in transit • File/folder encryption • Full-disk encryption for cloud workload storagevolumes • Specialized encryption (database,email) • Cloud-nativestorageencryption • Encrypting the data before transmission; authenticatingtheendpoints;and decryptingand verifyingthe data on arrival Data at rest Data intransit
  • 7. 7 Data loss prevention | Prevent PII data leakage TCS Confidential Classify PII databased on natureof business and regulatory standards Implement monitoringatthe boundary of network egress,on all internetdevices Install a data lossprevention (DLP) agent on hosts that process production data Enforce security policies rules -- based on the content and context of the data classification -- when certain types of data is accessed or leaked
  • 8. 8 Regulatory compliance | Establish user trust TCS Confidential Assessthe regulatoryrisks by identifying the gaps inthe existingsecuritysetup Enforce securitypoliciesto meetthe compliance requirements Buildauto-remediationcompliance capabilities Remediate the identifiedweaknessbased on the risk assessment
  • 9. 9 The combined synergy of TCS Cloud Foundation Designer and AWS Security Services TCS Confidential • PII data security design patternsfor five elements of sensitive user information • 40% reduced efforts to build security guardrails • Aligned with AWS well- architectedframework principles • Compliant with Center for Internet Security (CIS) AWS foundation benchmark • Role-based access control to workloads on AWS cloud • Advanced encryption engines • End-to-end, AI-driven data protection Amazon Macie AWS IAM AWS KMS AWS Security Hub AWS Certificate Manager (ACM) AWS CloudHSM AWS Secrets Manager AWS Shield
  • 10. 10 A quick recap on protecting PII data TCS Confidential Protectingdata onAWScloudis easier witha host of security services at organization’s disposal MonitoringPII data access andstorage canbe achievedusinga combination of AWS-native security services,AI services andthird-party tools Compliance to industry standards is paramount to continue business and privacy assurance to customers Building security foundations forAWScloudis supportedby an automatedparadigm By minimizing storage anduse of PII,enterprises cansignificantly reduce the risk for data breaches andmisuse of data,andlower compliance costs.
  • 11. Thank you Copyright © 2021 Tata ConsultancyServices Limited TCS Confidential Write to us @ BusinessAndTechnologyServices.Marketing@TCS.COM to know more about protectingPII data