Get instant visibility into assets containing sensitive data. Data Security Posture helps you assess your organization's data risk and identify both cloud and local assets with the riskiest sensitive data.
Data Security Posture uses templates to deploy and execute a script in your AWS, Google
Cloud, or Azure cloud environment. You can enable Data Security Posture when adding
a new cloud account or updating an existing one in Cloud Accounts. The steps to enable
Data Security Posture vary between cloud providers:
-
AWS accounts require deployment of a CloudFormation template in your AWS environment. For more information, see Enable Data Security Posture on AWS accounts.
-
Azure subscriptions and Google Cloud projects require deployment of a Terraform template, which runs a script in your cloud environment to allow Trend Vision One™ to monitor changes in your storage accounts. For more information, see Enable Data Security Posture on Azure subscriptions and Enable Data Security Posture on Google Cloud projects.
After enabling Data Security Posture,
Trend Vision One™ discovers and classifies sensitive data in your cloud accounts, and predicts potential
attack paths for data leakage due to misconfigurations or vulnerabilities.
TipData Security Posture monitors cloud assets for sensitive data. To monitor local devices
and files you must create a data policy. For more information, see Create a data policy.
|
The following table describes each widget in Data Security Posture.
| Widget | Description |
| Data Risk |
A graphical representation of your organization's data risk over time. Data Risk is
calculated as a summary of all risk events for assets with sensitive data.
For more information, see Data Risk.
|
| Top Risky Assets with Sensitive Data |
A list of the assets in your organization with sensitive data that have the highest
risk
scores among all monitored assets in your environment.
For more information, see Top Risky Assets with Sensitive Data.
|
| Sensitive Data Overview |
A summary of sensitive data, including a breakdown of sensitive data types and a summary
of contributing sources.
For more information, see Sensitive Data Overview.
|
| Sensitive Data by Location |
Displays a map with the number of assets with sensitive data by geographical location.
Hover over each number to view details.
For more information, see Sensitive Data by Location.
|
| Exposure Risk Events |
A list of exposure-related risk events.
For more information, see Exposure Risk Events.
|
