in ,

RSAC 2024 Innovation Sandbox | Bedrock Security: Seamless and efficient data security solution


read: 7

May 6th

RSA Conference 2024

will officially open

As the “Oscar of Safety”

RSAC Innovation Sandbox (Innovation Sandbox

Has become an innovation benchmark in the network security industry

under innovation

Together with Mr. Green Alliance

Focus on new hot spots in network security

Insight into new trends in security development

walk intoBedrock Security

*RSAC 2024 Top Ten Innovation Sandbox

1. Company introduction

Bedrock Security is a company focused on data security, with a special focus on data security in the era of cloud computing and artificial intelligence. Their mission is to enable enterprises to confidently handle data growth without compromising security. Bedrock Security was founded in 2022 by data security experts Pranava Adduri and Ganesha Shanmuganathan. Pranava has served as a founding engineer at unicorn startups (Box and Rubrik); he has worked at Amazon Web Services, scaling a completely new product line to over $200 million. Pranava is passionate about helping enterprises keep user data secure. While at Rubrik and AWS, Pranava worked with Fortune 500 customers to build reliable, scalable data protection and security services. His solutions have helped Fortune 500 companies mitigate catastrophic ransomware attacks. Shanmuganathan has an engineering background with Cohesity and VMware and over 50 patents. He and Adduri co-developed the Bedrock platform.

In March 2024, Bedrock Security announced it had received $10 million in seed funding led by Greylock. Greylock has previously invested in network security companies such as Palo Alto Networks, Okta, Obsidian Security, and Opal.

Figure 1 Bedrock founders Pranava Adduri and Ganesha Shanmuganathan

2. Background introduction

In order to adapt to competition and market demands, enterprises are rapidly adopting cloud computing and GenAI services, which has led to an explosive growth of data that exceeds current data security capabilities. In order to deal with the security issues caused by the growing amount of data, enterprises need to continuously evolve and develop their data security capabilities. They must ensure that these massive amounts of data can be accurately identified and secured without impeding business operations. Rapidly growing data and increasingly complex network environments have brought three data security challenges:

  1. Rapidly growing and flowing data volumes make it difficult to discover and classify sensitive data, especially as data grows, moves, and replicates in a distributed environment.
  2. Structured and Unstructured Data Types Structured data is easier to analyze and classify quickly than unstructured data, but most companies have both types of data, and traditional data security solutions are very rigid when it comes to identifying data types. It is difficult to provide adequate protection.
  3. Processing Massive Data Analyzing massive amounts of data is often slow, inaccurate, and expensive. Frequent rescans are needed to maintain accuracy, but rapidly growing data volumes and slow analysis times hinder processing of massive amounts of data. Fixed sampling, which only looks at a small portion of all data, is much faster but far less accurate, leaving sensitive data unprotected.

Traditional data security cannot meet today’s challenges

Although data is exploding exponentially, the corresponding security response is indeed growing linearly—the size of the security team cannot grow according to the amount of data. According to IDC, the global data volume will reach 175 ZB by 2025. According to one survey(2), the amount of data processed by enterprises each month has increased by an average of 63%, with 12% of respondents reporting a 100% increase in data volume. At the same time, businesses are facing a growing number of cyber threats targeting this data.

Existing traditional security tools are not specifically designed to analyze and protect an enterprise's data usage. Attacks are occurring with increasing frequency, and the attack surface continues to expand with the increase in data. In response to these security risks, regulations regarding data security are increasing(3), requiring companies affected by cyber incidents to respond in a shorter time frame. Response may not be as prompt for a variety of reasons, including a lack of cybersecurity talent (4). Delays in identifying and classifying sensitive data result in longer recovery, repair, respond, or resolve (MTTR) times.

Security teams must quickly identify and classify data and harden it as much as possible to ensure compliance with regulations and no over-privileged data access or data exposure. At the same time, security teams need to continuously evaluate data security incidents that violate policies. Delays in data access will cause friction between security and other business lines. Different teams want to have priority access to data, which leads to various teams competing for resources and more investment in data security. Growing data demands pose new challenges for security teams and may reduce the ability of cybersecurity teams to respond to other cyber threats and security issues.

Traditional data security solutions, including data security posture management (DSPM), fail to meet modern business needs. Traditional data security solutions often rely on (inaccurate) rules-based data classification, cannot guarantee accuracy and speed, and cannot handle large-scale data. Security teams spend a lot of time updating rules in response to changing patterns. But the results are often unsatisfactory because dynamic data usage disrupts static rules.

Traditional Data Security Solutions Versus Bedrock

3. “Frictionless” styleData Security

Bedrock Security has always emphasized that it provides “frictionless” data security products/solutions. So how do you understand “frictionless”? We might as well define it from the following dimensions:
Enterprise perspective
CISOs no longer have to hold back business objectives or risk additional information leaks when pursuing data use by business units and the board of directors.
Security team perspective
By simplifying data access and protection, internal security teams, including security center, governance, risk and compliance teams can work together seamlessly.
personal perspective
Security team members do not have to spend a lot of time handling work orders; compliance teams do not need to hold a lot of meetings and do not block the execution of normal business; members of the engineering team also have less workload because data security is simplified.

Figure 2 “Friction” between data scale and security resources

4. How does Bedrock do it?

The Bedrock platform is powered by the Data Artificial Intelligence Inference (AIR) engine to continuously discover, manage and protect sensitive data. AIR automatically understands which data is most important to the enterprise, allowing enterprises to protect their most valuable assets without slowing data growth or preventing the use of data to accelerate business success.
No.1
Bedrock achieves accurate identification of data
The first point to achieve “frictionless” data security is to be able to accurately classify data and provide the ability to visualize data relationships. Every business conducts a risk assessment to understand where vulnerabilities lie and how to remediate them. This is part of meeting compliance requirements and part of responding to a data breach. Risk assessments must identify, assess and prioritize risks, including those associated with the storage, processing and transmission of data within the enterprise. For many enterprises, identifying all data created, modified and transmitted in complex distributed data environments is a huge challenge. Traditional solutions struggle to maintain visibility across these cloud platforms and third-party services, leading to vulnerabilities in data discovery and classification, increasing risk. Many traditional solutions rely on static rules (also known as regular expressions) to identify and classify data, which inevitably misses anything that does not comply with these rigid rules, leaving large amounts of data unidentified and unprotected. Solutions that use “brute force” traversal reviewing each line of the file to classify the data can accurately assess the data, but this process is expensive and takes months to complete, so the data is always stale. Simply sampling a small portion of the data will be fast, but will not classify all of the data, leaving some sensitive information vulnerable. In addition to this, traditional solutions struggle to identify and classify unstructured data and cannot handle exponential data growth, impacting performance.

The Bedrock platform uses existing APIs to discover structured and unstructured data sets, providing comprehensive data insights including data classification, context and data mapping, data type and context. Bedrock dynamically adjusts sampling up and down based on the characteristics of each specific file and data storage. For example, for structured data sets such as databases, Bedrock can analyze smaller samples and determine the type of data stored in the database with a very high probability, thereby classifying the data accurately and quickly. For unstructured data, Bedrock uses a larger sample to understand it. If the AIR engine identifies sensitive data in a specific folder, the sample size is increased to ensure that all sensitive data is identified and classified. The ability to adjust scans based on data type and content discovered accelerates the data discovery process, ensuring the accuracy and visibility of all data.

In addition to finding data, classifying it, and determining how the data flows, Bedrock uses large language models (LLM) and other artificial intelligence (AI) and machine learning (ML) methods to analyze the data and determine the data type of the file, what it contains content and the owner of the file. For example, a bank uses a customer's Social Security number in account information, but also stores the Social Security number of its employees. Although these data types are the same, the purpose and ownership of the data are completely different. The AIR engine helps classify data appropriately and coordinates the permissions you want to set based on the business purpose of the data.

No.2
Bedrock enables data security and compliance
Accurate classification of data types and uses enables the Bedrock platform to generate risk and impact scores based on each data volume and the sensitivity of the data it contains. The rating includes the impact on the business following a data breach, helping to prioritize risks. Traditional solutions provide incomplete visibility and make it difficult to uniformly enforce security policies or ensure compliance across all assets. The AIR engine identifies and classifies all data, then creates an impact score based on the data's criticality, telling which databases and data stores need the most protection. Effectively protecting data also requires continuous security assessment for real-time data detection and response to changing data and anomalous activity caused by threats. The Bedrock platform continuously discovers, analyzes and categorizes data, enabling enterprises to ensure that any security or compliance breaches are dealt with quickly. While it is important to comply with regulatory requirements, it is equally important to ensure compliance with internal company policies. The Bedrock platform allows a customer's own policies and restrictions to be applied, which are then analyzed to ensure the customer's own data security requirements are met. Bedrock simplifies this process by providing “Trust Boundaries”. These boundaries provide a fast, adaptive and automated way to define, alert and control data breaches based on an enterprise's business critical needs.

Bedrock's Trust Boundaries allow policies to be written in natural language, providing an easy and flexible way to manage secure data access. The AIR engine's dynamic understanding of data eliminates the need for users to worry about how to define each data group, but only to focus on how the data is used and who can access it.

No.3
Bedrock reduces data risk exposure
Underpinned by its fast and accurate risk analysis capabilities, the Bedrock platform understands data and manages policies and violations to minimize risk surfaces. It allows businesses to gain insights into problems in their environment and make recommendations on how to solve them. Bedrock reduces risks from the following three aspects:

  1. Data reduction identifies all the data you have, determines which data is unnecessary, and deletes or moves it to cold storage, making it extremely difficult to access.
  2. Minimize Access Access controls are an important way to minimize data risk. Once you understand your data, how it flows, and who has access to it, you can determine who needs the data and limit access to those who truly need it.
  3. Hardening data encryption is a way to make data harder to steal, but doing that requires continuous discovery of what data is present throughout your environment.

Bedrock's AIR engine eliminates data risk by minimizing it by locating stale or ghost data; it also assesses the impact of identity access to set permissions based on the principle of least privilege and harden data so that it can be The impact of a data breach is minimized. The more users who have access to a sensitive data set, the more avenues an attacker has to compromise the account, ultimately compromising the data itself. The Bedrock platform minimizes this risk by reducing data, minimizing access and hardening it, allowing for easy remediation if any issues arise.

No.4
Bedrock's architecture
Bedrock has two key components: one is Bedrock Outpost Analyzer, which is deployed in the customer's environment through infrastructure as code; the other is Bedrock SaaS Platform, which collects metadata through Bedrock's AIR Engine. Process and provide Bedrock's user interface.Bedrock Outpost Analyzer

Discover and classify data on the customer's data side, and only send metadata to the Bedrock SaaS Platform. This means that Bedrock will not obtain customer data, protecting customer privacy. For example, if a field in the database is named “Passport Number”, Bedrock will only get the name of the field but not the actual value.

Figure 3 Bedrock product architecture

Serverless DiscoveryBedrock Outpost Analyzer uses customers' existing APIs to discover data assets and supports structured and unstructured data. You only need to simply configure Bedrock, and the system can automatically complete the rest of the work. Throughout the entire process, the data never leaves the domain.

AIR (Artificial Intelligence Inference Engine)

AIR is the core of Bedrock, which understands the true meaning of data and the business value of data. AIR processes the metadata information of the customer environment, classifies it, analyzes security risks from multiple dimensions, and determines the priority of processing based on risk factors.

Remediation

For security incidents and risks discovered by AIR, Bedrock provides corresponding suggestions and remedial measures. Using the API integration tool provided by Bedrock, users can apply these remedial measures with one click, and can also generate corresponding work orders, which contain detailed instructions on how to solve these security issues.

Risk & Compliance Monitoring

Bedrock can detect hundreds of security violations, including unreasonable configurations, excessive permission configurations, etc. Bedrock's Trust Boundary (Bedrock Trust Boundary) can help customers quickly discover which data is important, and the Bedrock system ensures data security. For generative AI, Trust Boundary can be used to protect sensitive information of sources and results, core intellectual property information, etc.

“frictionless” security team collaboration

Bedrock helps different teams collaborate efficiently and securely. The security team can obtain security risk events; the compliance team can obtain compliance analysis reports and create new policies to respond to assessments and audits; the governance team can create data access policies based on users, data types, data sources and other factors.

5. Summary

In today's era of cloud computing and AI, managing and ensuring the security of data is crucial for enterprises. Traditional data security solutions cannot cope with large-scale and dynamic data, and are difficult to apply in cloud computing and AI environments. Enterprises must adopt data security measures to achieve efficient and seamless risk management and remediation. Bedrock Security, introduced in this article, uses AIR to achieve fast and accurate risk assessment; even when data is constantly updated and growing, it can still ensure that enterprises manage data efficiently and securely. Bedrock's AIR provides visual data correlation analysis to help enterprises reduce the attack surface. From the analysis of Bedrock Security and other companies in this year’s Innovation Sandbox, we can easily find that using AI to solve data security problems has become a trend in recent years. In subsequent articles, we will also introduce technologies such as the use of AI to achieve hierarchical classification of sensitive data. Interested readers are welcome to continue to pay attention.

references

(1) Bedrock Security Unveils the Industry’s First Frictionless Data Security Platform, Announces $10 Million in Seed Funding https://www.businesswire.com/news/home/20240326144629/en/Bedrock-Security-Unveils-the-Industry%E2%80%99s-First-Frictionless-Data-Security-Platform-Announces-10-Million-in-Seed-Funding

(2) The Impact of Data Growth on Enterprises https://www.dataversity.net/the-impact-of-data-growth-on-enterprises/

(3) Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure https://www.sec.gov/files/rules/final/2023/33-11216

(4) Amanda Steinman (2023) ISC2 Reveals Growth in Global Cybersecurity Workforce, But Record-Breaking Gap of 4 Million Cybersecurity Professionals Looms https://www.isc2.org/Insights/2023/10/ISC2-Reveals-Workforce-Growth-But-Record-Breaking-Gap-4-Million-Cybersecurity-Professionals

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Hacker group uses Carbanak backdoor to “target” the U.S. auto industry

What kind of force is the information support force?Department of Defense Answers