Example insights from the report
Shadow Data
The DRA identifies shadow data that is not properly classified, secured, ormanaged, which can pose risks to the organization, and recommends implementing appropriate controls.
Over Privileged Users
The assessment highlights accounts within the system or network who have been granted excessive or unnecessary permissions and privileges beyond what is required for their job role. These additional privileges include access to sensitive data, administrative controls, and the ability to perform actions that could potentially compromise the security of the system or data.
Over Exposed Data
Data that is confidential or private but is inadvertently or intentionally made accessible to unauthorised individuals or entities can be a major risk. As a result of poor protection practices, misconfigured security settings and the sharing of sensitive information through insecure channels, this poses significant risks to data privacy, security, and regulatory compliance.
Data Sovereignty
Data is subject to the laws and regulations of the jurisdiction in which it is physically located, and is critical to the control and legal ownership of data. This report identifies where data is stored and transmitted. Measured against regulations to assess risk of legal consequences and data privacy breaches