Wednesday, June 12, 2019

Managing SAP BI Security – Sensitive Data Governance


Managing security within your SAP BI deployment is hard enough, but you also have to be concerned with your deployment's periphery, and its relation to external data sources.

The APOS Intelligent Data Access Controller (IDAC) extends the BI administrator's control of data processes beyond the BI system to the data sources themselves. IDAC gives you the ability to monitor and manage queries from your BI system to all of your enterprise data sources.

New and evolving regulatory requirements create additional complexity for BI platform managers and administrators. To meet these requirements and overcome complexity, you need to take a proactive approach to data access, audit and accountability within your SAP BusinessObjects deployment. You need to know who is doing what, where, and when.

IDAC is an intelligent, data source agnostic solution that can vastly improve the ability of BI platform managers, administrators and technicians to exert control over data and data access across multiple applications, operating systems, and data sources and types. This solution helps you manage and audit data access and activity across technologies, while improving system performance, information security, data privacy, and regulatory accountability.

Flagging Sensitive Data
When you are reviewing the security of your BI system, sensitive data deserves special consideration, especially in industries such as financial services and healthcare, where the security and privacy of data is highly regulated. BI platform managers and administrators need to be able to track user access and report on it to the appropriate regulatory and internal governance authorities when necessary. Unauthorized access constitutes a data breach, regardless of intention, and regardless of whether it is external or internal.

One of the key features of the IDAC solution is the ability to track specific fields. For example, in a healthcare environment, you can set up alerts to be triggered by a query against a Patient ID. This is particularly useful, because under HIPAA a patient has the right to know who has accessed their health records. A query to the IDAC database can give you this information immediately. You can also use the data from the IDAC database to analyze user behavior over time.

Featured Posts

    Get our newsletter for the latest BI insights and blog posts!

    Subscribe!

     

     


    Post Archive