DSPM identifies and prioritizes vulnerabilities associated with each data asset. Primarily, DSPM looks for the following vulnerabilities:
Misconfigurations
Misconfigurations are missing or incomplete application or system security settings that leave an organization’s data vulnerable to unauthorized access. The most-cited result of misconfiguration is unsecured cloud data storage, but misconfigurations can also create vulnerabilities such as unapplied security patches and missed data encryption. Misconfiguration is widely considered to be the most common cloud data security risk and is a prevailing cause of data loss or leakage.
Overentitlements (or overpermissioning)
Overentitlements grant users more data access privileges or permissions than they need to do their jobs. Overentitlemments can be the result of misconfiguration, but they can also occur if the entitlements are intentionally escalated improperly or carelessly (or maliciously, by a threat actor), or when permissions that are intended to be temporary aren’t revoked when they’re no longer required.
Data flow and data lineage issues
Data flow analysis tracks all the places that the data have been and who had access to it in each place. Combined with information on infrastructure vulnerabilities, data flow analysis can reveal potential attack paths to sensitive data.
Security policy and regulatory violations
DSPM solutions map the data’s existing security settings to the organization’s data security policies—and to the data security requirements mandated by any regulatory frameworks to which the organization is subject—to identify where data is inadequately protected and where the organization runs the risk of non-compliance.