The Top 5 Questions: How DSPM Illuminates the Murky World of Multi-Cloud Data Security
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要通读文章,抓住主要观点。 文章主要讨论了多云环境下的数据安全威胁,提到了复杂性增加、访问控制不足和AI的快速发展是主要驱动因素。然后,提到了Forrester和Thales的研究结果,指出组织在管理多云数据时面临的问题,比如影子数据、合规性和不一致的访问控制。 接着,文章讨论了数据安全盲点、优先保护的数据类型、风险分类、AI对敏感数据的影响以及为什么需要加强云原生控制与DSPM(数据安全态势管理)的结合。最后,总结了DSPM工具如何帮助组织自动化数据发现、分类和保护,从而降低风险。 现在,我需要把这些要点浓缩到100字以内。要突出多云环境中的威胁、挑战以及DSPM的作用。确保语言简洁明了,不使用复杂的术语。 可能的结构是:先点出多云环境中的威胁和挑战,然后提到DSPM的作用和优势。这样既涵盖了问题又提出了解决方案。 最后检查字数,确保不超过限制,并且信息准确传达。 </think> 文章探讨了多云环境下数据安全面临的威胁与挑战,包括复杂性增加、访问控制不足及AI带来的风险。专家指出需优先保护敏感数据,并通过DSPM工具实现统一的数据发现、分类与保护,以应对多云环境中的盲点与合规难题。 2026-3-5 16:9:23 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Multi-cloud data security threats are escalating at an unprecedented rate. According to Forrester and the 2025 Thales Global Cloud Data Security Study, the primary drivers of multi-cloud risks are: growing complexity, insufficient access controls, and the rapid rise of AI. As organizations expand across multiple cloud platforms, they face growing challenges related to shadow data, regulatory compliance, and inconsistent access controls in disparate clouds.

Collectively, these challenges create a significant data security vulnerability. Nearly 89% of organizations struggle for clarity about what data exists, where, and how to safeguard it. AI further exacerbates vulnerabilities by expanding data creation, access, and usage, rendering many traditional data security tools inadequate. As a result, multi-cloud data security has become a Board of Directors’ priority.

In a recent webinar, guest speaker Heidi Shey, Principal Analyst, Forrester, and Todd Moore, Global VP/GM of Data Security Products, Thales, discussed critical data security strategies, focusing on the role of Data Security Posture Management (DSPM) in tracking and protecting data throughout its lifecycle. They answered the five most pressing questions and highlighted the essential need for automated, centralized security approaches for addressing the visibility and compliance challenges inherent in complex hybrid, and multi-cloud environments.

1. Where are the biggest blind spots in multi-cloud data protection?

Limited visibility remains one of the most persistent challenges in multi-cloud environments. Siloed cloud platforms, each with its own cloud-native data tools, restrict an organization’s ability to gain a comprehensive understanding of its data landscape. Without unified visibility, classification, and protection and enforcement controls, sensitive data becomes increasingly difficult to manage at scale.

2. Which data security use case should be prioritized?

The most fundamental question organizations need to answer is: “What data needs to be protected?” Regulated data, such as PII and PCI, requires protection. Beyond that, intellectual property, sensitive corporate information, and organizational secrets that may be embedded in code also need to be secured. All data must be protected throughout its entire lifecycle, including secure disposal.

3. How do you track risk to risk?

Equally important is recognizing the risks that must be addressed. While compliance risk has traditionally been the main priority for security programs, two emerging forces are rapidly amplifying data risk—and accelerating the need for stronger mitigation strategies:

It’s important to understand the types of data risk because, as Heidi Shey says, “Different types of data risks require different types of controls and mitigation.” 

The three types of data risks are:

  1. Risks to data, which stem from:
    • External cyber threats, such as bad actors that try to steal your data
    • Resiliency concerns from internal practices, like back-up data sources that have not been tested, and cannot reliably and rapidly restore data in the case of a breach
    • Asset disposal, such as decommissioning equipment containing data not removed from the device
    • Quantum computing can break today’s encryption methods. Post-quantum cryptography (PQC) is needed to future-proof data security
  2. Risks from data, arising from how you are using the data
    • Unethical use of data, such as biased algorithms in AI
    • Data sprawl, for example, customer data in local spreadsheets, CRM, and data warehouses
    • Noncompliant data or poorly governed data can produce flawed or risky outcomes when used, especially in AI-driven decision-making
  3. Risks in data, resulting from data management gaps
    • Data integrity can be incomplete, inaccurate, invalid, inconsistent, or even poisoned data
    • Data lifecycle management must properly handle redundant, obsolete, and trivial (ROT) data, so that, for example, stale data is not fed into AI algorithms

There are different types of data risks, requiring different controls and mitigations

Source: Forrester Research

Source: Forrester Research

4. How does AI impact sensitive data?

Moving at the speed of AI: As AI adoption surges, so does AI’s access to sensitive data. Organizations must evolve their risk planning and threat models accordingly, and use AI to enhance defensive tactics such as threat and gap analysis, detection validation, and automated remediation.

In parallel, AI-driven attacks, exploitation of vulnerabilities, and system malfunctions introduce additional layers of complexity that security teams must be prepared to navigate.

Transition to quantum-safe security: Organizations should begin preparing for post quantum cryptography by conducting an inventory of where encryption is used across the organization today and building a clear roadmap to upgrade to modern, quantum resilient standards as they emerge.

Per Todd Moore, “While AI and quantum computing introduce new risks, preparing for them simultaneously requires organizations to discover, classify, cleanse, and protect their data—using techniques such as masking and tokenization—before that data is put to use.”

5. Why there is a need to fortify cloud-native controls with DSPM?

Cloud service providers (CSPs) offer cloud-native data security tools designed to protect data in their individual platforms. However, relying solely on cloud-native security features introduces several risk deficiencies. These deficiencies stem from variances in visibility, capabilities, configurability, and inter-platform coordination.

Each CSP implements distinct security controls, APIs, and configuration standards such as AWS GuardDuty, Azure Security Center, and GCP Security Command Center. Differences in firewall capabilities, intrusion prevention, and threat intelligence integration may leave workloads inconsistently protected because a vulnerability addressed in one cloud platform may remain exposed in another.

In short, cloud-native tools alone cannot deliver consistent or comprehensive data protection in multi-cloud environments. Overreliance on these tools often increases operational complexity, fragments security controls, and creates blind spots that elevate overall risk.

Summary: The end goal is to reduce risk in multi-cloud environments

To address these challenges, organizations are increasingly adopting data security posture management (DSPM) as a dedicated security discipline for multi-cloud environments. DSPM-based tools enable a data-first approach by automating data discovery, classification, risk assessment, and encryption protection across hybrid and multi-cloud infrastructures.

A unified approach to securing data must span all states of —data creation, data in motion, data at rest, and data in use. In multi-cloud environments, where risk continues to rise, traditional tools leave critical data exposed and limit the ability to safely leverage AI and prepare for a post-quantum future.

As Todd Moore explains, “By consolidating discovery, monitoring, protection, and control into a single, unified platform across clouds, organizations can reduce blind spots, simplify operations, and regain control over their data. DSPM illuminates a clear path forward—bringing visibility and resilience to multi-cloud data security and enabling a safer, more secure data future.”

Listen to the full Thales and Forrester webinar here

Learn more about Thales Data Security Posture Management

Learn more about Thales CipherTrust Data Security Platform


文章来源: https://securityboulevard.com/2026/03/the-top-5-questions-how-dspm-illuminates-the-murky-world-of-multi-cloud-data-security/
如有侵权请联系:admin#unsafe.sh