THANK YOU FOR SUBSCRIBING
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Gov CIO Outlook
THANK YOU FOR SUBSCRIBING
By
Government CIO Outlook | Tuesday, June 01, 2021
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
Any government cyber security policy must prioritize the protection of sensitive data—use dynamic authorization.
Fremont, CA: Governments are under constant attack from both independent and state-sponsored entities. Building protections around the organization and its data is the most obvious course of action. This is a brilliant move. It is, however, insufficient. Internally, critical and sensitive government data must be safeguarded.
To avoid data loss and integrity risks, you should have complete control over who, when, and how your most sensitive data is accessed as a government entity. Not only that, but you'll need a record of who has access to what, how, when, and why. This is necessary in order to comply with security mandates and privacy legislation.
Sensitive data that has been accumulated over many years is awash in government offices. This contains highly sensitive data about individuals and businesses, as well as national security material that must be kept secure at all costs. This is why governments continue to be such a popular target for cyber-attacks.
Static access restrictions cannot be used to protect data in government agencies because they often have hundreds or thousands of personnel. The advent of new infrastructure – as services and data migrate to the cloud – exacerbates the problem by opening up new attack vectors. The pandemic has made matters worse, as home offices have added yet another layer of government data security to manage and defend. Data security has become a necessity for governments.
A high-security, dynamic authorization system is the best method to secure national data from within, whether it's in the cloud or on-premise. Agencies can now perform access control in real time based on organizational policies, rules, laws, and regulations.
In reality, it provides the fine-grained controls required to construct a mission-critical policy defining a user's access rights to a data record, for example, taking into account a user's identity, credentials, role, time of access, and citizenship details.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info