Fiveable

๐Ÿ“ŠBusiness Intelligence Unit 12 Review

QR code for Business Intelligence practice questions

12.3 Data Security and Privacy in Cloud BI

๐Ÿ“ŠBusiness Intelligence
Unit 12 Review

12.3 Data Security and Privacy in Cloud BI

Written by the Fiveable Content Team โ€ข Last updated September 2025
Written by the Fiveable Content Team โ€ข Last updated September 2025
๐Ÿ“ŠBusiness Intelligence
Unit & Topic Study Guides

Cloud BI brings powerful data analysis capabilities, but also raises security and privacy concerns. From data breaches to compliance challenges, organizations must navigate a complex landscape of risks when leveraging cloud-based business intelligence solutions.

The shared responsibility model is key to understanding security in cloud BI. While providers secure the infrastructure, customers must protect their data and applications. Encryption, access controls, and compliance measures are essential for safeguarding sensitive information in the cloud.

Data Security and Privacy in Cloud BI

Key security and privacy concerns

  • Data breaches and unauthorized access
    • Sensitive data exposure due to misconfigured cloud services (unsecured S3 buckets)
    • Insider threats from cloud service provider employees with privileged access
  • Data loss and integrity issues
    • Accidental deletion or modification of data by users or administrators
    • Hardware failures or natural disasters (earthquakes, floods) affecting cloud infrastructure
  • Lack of visibility and control over data
    • Difficulty in monitoring data access and usage across multiple cloud services
    • Limited ability to enforce company-specific security policies in shared cloud environments
  • Compliance and regulatory challenges
    • Ensuring adherence to industry-specific regulations (HIPAA for healthcare, GDPR for personal data)
    • Maintaining data sovereignty and cross-border data transfer restrictions (EU-US Privacy Shield)

Shared responsibility model

  • Division of security responsibilities between the cloud service provider and the customer
    • Cloud service provider secures the underlying infrastructure and services
      • Physical security of data centers (access controls, surveillance)
      • Network security and access controls (firewalls, intrusion detection)
      • Patching and updating of cloud infrastructure (operating systems, virtualization)
    • Customer responsible for securing their data and applications
      • Configuring access controls and permissions (user roles, privileges)
      • Encrypting sensitive data (at rest and in transit)
      • Monitoring user activity and data access (audit logs, anomaly detection)
  • Importance of understanding the specific responsibilities for each cloud service model
    • Infrastructure as a Service (IaaS) gives customer more control and responsibility (Amazon EC2)
    • Platform as a Service (PaaS) involves shared responsibility between provider and customer (Microsoft Azure)
    • Software as a Service (SaaS) has provider handling most security aspects, customer manages user access (Salesforce)

Encryption and access controls

  • Data encryption
    • Protects data confidentiality and integrity
      1. Encrypts data at rest (stored in the cloud)
      2. Encrypts data in transit (during transmission)
    • Mitigates risks associated with unauthorized access or data breaches
    • Ensures compliance with regulatory requirements (HIPAA, PCI DSS)
  • Access controls
    • Implement strong authentication mechanisms
      • Multi-factor authentication (MFA) using tokens or biometrics
      • Single sign-on (SSO) for centralized access management across applications
    • Apply granular access permissions
      • Role-based access control (RBAC) to assign permissions based on job functions
      • Principle of least privilege to grant only necessary access rights
    • Monitor and audit user activity
      • Detect and investigate suspicious access attempts (brute-force attacks)
      • Maintain audit logs for compliance and forensic purposes (user actions, timestamps)

Compliance and regulations

  • Industry-specific regulations
    • Health Insurance Portability and Accountability Act (HIPAA) for protecting healthcare data
    • Payment Card Industry Data Security Standard (PCI DSS) for securing financial transactions
    • General Data Protection Regulation (GDPR) for safeguarding personal data of EU citizens
  • Data sovereignty and localization requirements
    • Ensuring data is stored and processed in specific geographic locations (data residency)
    • Complying with country-specific data protection laws (China's Cybersecurity Law)
  • Conducting regular compliance audits
    • Assessing the effectiveness of security controls (penetration testing, vulnerability scans)
    • Identifying and addressing gaps in compliance (remediation plans, risk assessments)
  • Obtaining relevant certifications and attestations
    • SOC 2 (Service Organization Control 2) for demonstrating security, availability, and confidentiality
    • ISO 27001 for implementing an information security management system (ISMS)