Most enterprise organizations gather extensive security data from their information (IT) and operational (OT) infrastructure. While the sources of this security telemetry data are important, the destination of that data is arguably more critical for organizations concerned with data sovereignty.
When security telemetry data is collected by endpoint agents or network probes, it is typically forwarded to one or more central analytics platforms. Examples of these include security information and event management (SIEM) systems as well as the central systems associated with endpoint-based (EDR) or network-based (NDR) threat detection and response systems. The location of these analytics platforms can have a material impact on data sovereignty.
Data sovereignty refers to an organization's right and responsibility to control the location and usage of its data. This is crucial for managing sensitive information and complying with data privacy and other regulations.
In this blog article, we explore the relationship between security telemetry and data sovereignty. We'll look at the challenges organizations face in maintaining control of their security data and discuss strategies for selecting technologies that prioritize data sovereignty.
These telemetry sources automatically extract, record and send data from all over your network and send it back to a central hub to be further processed and analyzed, revealing valuable insights about traffic patterns, system health, user activity, and more, helping IT and security operations teams identify and address security threats effectively.
With data sovereignty in mind, let’s look at the two primary sources of security telemetry and the data they generate:
Network Telemetry: Network security systems like Network Detection and Response (NDR) and Intrusion Detection/Prevention Systems (IDS/IPS) generate various types of telemetry data that organizations need to be mindful of for data sovereignty purposes. This includes network traffic data like source and destination IP addresses, ports used, and protocols involved. Beyond basic traffic metadata, NDR can generate packet captures (PCAPs), which can contain the raw data being transmitted across the network. This can include sensitive information like usernames, passwords, or even snippets of internal documents. Additionally, these systems may collect sensitive user metadata that ties specific actions to user accounts or devices on the network.Sample endpoint telemetry gathered by Microsoft System Monitor:
The telemetry gathered by both network and endpoint security tools work together to provide a comprehensive view of your IT security posture. Network telemetry can provide a birds-eye view of network traffic while endpoint telemetry gives you a closer look at what’s happening on individual devices.
So, why does security telemetry matter in the context of data sovereignty?
It matters because security telemetry often contains highly sensitive information about an organization’s internal operations. Network telemetry can capture full packets and generate metadata containing clear text usernames, passwords, or even internal documents. Similarly, endpoint telemetry tracks file and user activity that could expose sensitive data. Data sovereignty becomes incredibly important when using these types of security systems.
Organizations need to ensure their sensitive telemetry data resides in locations that comply with regulations and isn’t accessible by unauthorized parties, which in turn helps protect confidential information and avoid fines and data breaches. Maintaining this necessary level of control becomes incredibly difficult and increasingly important when we consider the conflicting regulations ruling data privacy around the world, especially as SaaS-based central analytics becomes more popular.
It is important to make the distinction between data residency and data sovereignty. While related, the two terms are not interchangeable:
Understanding these two concepts is vital to understanding the various regulations from around the world that organizations must navigate and comply with.
Understandably, these different regulations can cause conflict, legal challenges, and uncertainty for organizations operating in both regions. The recent invalidation of the Privacy Shield framework – a mechanism for data transfer between the US and EU – further highlights the ongoing tension.
Data sovereignty presents a complex issue for organizations operating in a globalized world. While it ostensibly aims to protect data privacy, it can also create significant challenges in terms of compliance, operations, and security in areas such as:
Threat detection and response systems that depend upon central analytics with a software as a service (SaaS) model raise significant data sovereignty concerns for organizations subject to strict privacy regulations. Unlike traditional software deployments, many vendors who deliver their solutions exclusively via SaaS-based systems often do not disclose data residency information, which can make achieving data sovereignty difficult.
These analytics platforms may be hosted anywhere globally, making it difficult – if not impossible – to pinpoint the exact location of an organization’s security telemetry data.
This lack of control clashes with data privacy regulations in certain regions that mandate strict boundaries for data storage. There are a number of potential consequences an organization might face if they choose a SaaS-based solutions:
When it comes to telemetry data, there are a number of questions you should consider asking to ensure that your data is protected:
Securing Telemetry Communications
Securing Telemetry Data at Rest (Central Analytics)
Various central analytics deployment options provide different benefits and challenges, and each organization must determine which option works best for them while still trying to meet the requirements of their local regulations. Let’s review some of the options:
Regardless of the central analytics deployment option an organization chooses, there are four main actionable strategies that can help you achieve greater levels of data sovereignty:
Choose security vendors that prioritize data sovereignty and minimize reliance on cloud infrastructure for telemetry processing.
The Stamus Security Platform (SSP) is a network-based threat detection and response (NDR) platform that delivers actionable network visibility and powerful threat detection in private cloud, public cloud, on-premise, or hybrid environments. Regardless of where you deploy the central analytics (Stamus Central Server), SSP prioritizes data sovereignty.
The Stamus Security Platform offers:
Here is how Stamus Security Platform fits into your existing security stack:
There is no single solution to achieving data sovereignty. Each organization will take a different path to achieve its goals based on the needs of that organization and the regulations of the regions in which it operates. And relinquishing control of some aspects of your data is inevitable in a modern enterprise. But, there are some key takeaways for every organization to consider regardless of their unique circumstances:
By understanding the complexities of data sovereignty and implementing a comprehensive approach, organizations can achieve a balance between effective data security and regulatory compliance, empowering them to not only protect their data, but own it too.
To stay updated with new blog posts from Stamus Networks, also make sure to subscribe to the Stamus Networks blog, follow us on Twitter, LinkedIn, and Facebook, or join our Discord.