Get instant visibility into cloud assets containing sensitive data. Data Security Posture helps you understand your organization's data risk, and to view and address cloud assets with the riskiest sensitive data.
Data Security Posture uses Terraform templates to deploy and execute a script in your
AWS or Azure cloud environment. You can enable Data Security Posture when adding a
new cloud account or updating an existing one in Cloud Accounts. The process to enable
Data Security Posture differs for AWS and Azure accounts:
-
For AWS accounts, you deploy a CloudFormation template in your AWS environment. For more information, see Enable Data Security Posture for your AWS cloud accounts.
-
For Azure subscriptions, you deploy a Terraform template, which runs a script in your Azure environment to allow Trend Vision One to monitor changes in your storage accounts. For more information, see Enable Data Security Posture on an Azure subscription.
After enabling Data Security Posture, Trend Vision One can discover and classify sensitive
data in your cloud accounts, and predict potential attack paths for data leakage due
to misconfigurations or vulnerabilities.
![]() |
TipData Security Posture monitors cloud assets for sensitive data. To monitor devices
and files in a network location, you must create data policies that identify the network
locations that you want to monitor. For more information, see Data Policy.
|
The following table describes each widget in Data Security Posture.
Widget | Description |
Data Risk |
A graphical representation of your organization's data risk over time. Data Risk is
calculated as a summary of all risk events for assets with sensitive data.
For more information, see Data Risk.
|
Top Risky Assets with Sensitive Data |
A list of the assets in your organization with sensitive data that have the highest
risk
scores among all monitored assets in your environment.
For more information, see Top Risky Assets with Sensitive Data.
|
Sensitive Data Overview |
A summary of sensitive data, including a breakdown of sensitive data types and a summary
of contributing sources.
For more information, see Sensitive Data Overview.
|
Sensitive Data by Location |
Displays a map with the number of assets with sensitive data by geographical location.
Hover over each number to view details.
For more information, see Sensitive Data by Location.
|
Exposure Risk Events |
A list of exposure-related risk events.
For more information, see Exposure Risk Events.
|