Data Security & Tracking Model

This guide explains several key concepts behind the Kinant Data Security Platform’s Tracking Model.

See Also: How Kinant is Different? Automating Compliance for GDPR

What is the Kinant Data Security Platform?

The Kinant Data Security Platform helps secure data by looking at your data and informing you of sensitive data located in an unsecure location. It also helps you discover copies of relevant data that are lying undiscovered and are potential sources of leaks.

You label critical data and fence it into secure perimeters. A secure perimeter is a grouping of storage assets that you wish to fence the data into. The platform goes about discovering data that is smilar to the tagged data sets and alerts you to data that lie outside their secure perimeters. Data flows between assets is mapped highlighting assets that are vulnerable to data leaks and breaches. The tracking model is explained below.

Tagging

A Tag is a label for a set of associated data. Tagging allows you to point to a data set that the platform can keep track of and learn from. Kinant uses data mining and machine learning to find data that is similar to the tagged data set.

Tags also allow you to Fence data in to a Secure Perimeter. Tags can be bound to Perimeters in the tags screen of you dashboard. Once a tag is bound to a perimeter and you select the option to fence your tag Kinant will alert you if your tag is found outside the perimeter it is fenced in.

Secure Perimeters

Kinant automatically discovers the storage assets in your account. The perimeters screen in your dashboard allows you to group your storage assets. You could group your storage assets by function, for example development environment or production environment, or by a path by which you expect your data to traverse, for example production file system and production backup S3 buckets.

Discovery

If you mark a tag to be tracked, Kinant periodically searches your storage assets for it. A list of files or objects that match the tag are displayed in the discovery screen of your dashboard.

Violations

The violations screen of your dashboard lists tags that are discovered outside their fenced in perimeter.

Next Steps

Deploy the Platform! Take a look at our Getting Started guide on how you can configure your AWS and use our automatic deployment binary. You can also take a look at a comparision between the Kinant Data Security Platform and others.


About The Kinant Team

Kinant site administrator.