Sentra Launches Breakthrough AI Classification Capabilities!
All Resources
In this article:
minus iconplus icon
Share the Blog

Minimizing your Data Attack Surface in the Cloud

November 8, 2022
4
Min Read

The cloud is one of the most important developments in the history of information technology. It drives innovation and speed for companies, giving engineers instant access to virtually any type of workload with unlimited scale.

But with opportunity comes a price - moving at these speeds increases the risk that data ends up in places that are not monitored for governance, risk and compliance issues. Of course, this increases the risk of a data breach, but it’s not the only reason we’re seeing so many breaches in the cloud era. Other reasons include: 

  • Systems are being built quickly for business units without adequate regard for security
  • More data is moving through the company as teams use and mine data more efficiently using tools such as cloud data warehouses, BI, and big data analytics
  • New roles are being created constantly for people who need to gain access to organizational data
  • New technologies are being adopted for business growth which require access to vast amounts of data - such as deep learning, novel language models, and new processors in the cloud
  • Anonymous cryptocurrencies have made data leaks lucrative.
  • Nation state powers are increasing cyber attacks due to new conflicts

Ultimately, there are only two methods which can mitigate the risk of cloud data leaks - better protecting your cloud infrastructure, and minimizing your data attack surface.

Protecting Cloud Infrastructure

Companies such as Wiz, Orca Security and Palo Alto provide great cloud security solutions, the most important of which is a Cloud Security Posture Management tool. CSPM tools help security teams to understand and remediate infrastructure related cloud security risks which are mostly related to misconfigurations, lateral movements of attackers, and vulnerable software that needs to be patched.

However, these tools cannot mitigate all attacks. Insider threats, careless handling of data, and malicious attackers will always find ways to get a hold of organizational data, whether it is in the cloud, in different SaaS services, or on employee workstations. Even the most protected infrastructure cannot withstand social engineering attacks or accidental mishandling of sensitive data. The best way to mitigate the risk for sensitive data leaks is by minimizing the “data attack surface” of the cloud.

What is the "Data Attack Surface"?

Data attack surface is a term that describes the potential exposure of an organization’s sensitive data in the event of a data breach. If a traditional attack surface is the sum of all an organization’s vulnerabilities, a data attack surface is the sum of all sensitive data that isn’t secured properly. 

The larger the data attack surface - the more sensitive data you have - the higher the chances are that a data breach will occur.

There are several ways to reduce the chances of a data breach:

  • Reduce access to sensitive data
  • Reduce the number of systems that process sensitive data
  • Reduce the number of outputs that data processing systems write
  • Address misconfigurations of the infrastructure which holds sensitive data
  • Isolate infrastructure which holds sensitive data
  • Tokenize data
  • Encrypt data at rest
  • Encrypt data in transit
  • Use proxies which limit and govern access to sensitive data of engineers

Reduce Your Data Attack Surface by using a Least Privilege Approach

The less people and systems have access to sensitive data, the less chances a misconfiguration or an insider will cause a data breach. 

The most optimal method of reducing access to data is by using the least privilege approach  of only granting access to entities that need the data.  The type of access is also important  - if read-only access is enough, then it’s important to make sure that write access or administrative access is not accidentally granted. 

To know which entities need what access, engineering teams need to be responsible for mapping all systems in the organization and ensuring that no data stores are accessible to entities which do not need access.

Engineers can get started by analyzing the actual use of the data using cloud tools such as Cloudtrail.  Once there’s an understanding of which users and services access infrastructure with sensitive data, the actual permissions to the data stores should be reviewed and matched against usage data. If partial permissions are adequate to keep operations running, then it’s possible to reduce the existing permissions within existing roles. 

Reducing Your Data Attack Surface by Tokenizing Your Sensitive Data

Tokenization is a great tool which can protect your data - however it’s hard to deploy and requires a lot of effort from engineers. 

Tokenization is the act of replacing sensitive data such as email addresses and credit card information with tokens, which correspond to the actual data. These tokens can reside in databases and logs throughout your cloud environment without any concern, since exposing them does not reveal the actual data but only a reference to the data.

When the data actually needs to be used (e.g. when emailing the customer or making a transaction with their credit card) the token can be used to access a vault which holds the sensitive information. This vault is highly secured using throttling limits, strong encryption, very strict access limits, and even hardware-based methods to provide adequate protection.

This method also provides a simple way to purge sensitive customer data, since the tokens that represent the sensitive data are meaningless if the data was purged from the sensitive data vault.

Reducing Your Data Attack Surface by Encrypting Your Sensitive Data

Encryption is an important technique which should almost always be used to protect sensitive data. There are two methods of encryption: using the infrastructure or platform you are using to encrypt and decrypt the data, or encrypting it on your own. In most cases, it’s more convenient to encrypt your data using the platform because it is simply a configuration change. This will allow you to ensure that only the people who need access to data will have access via encryption keys. In Amazon Web Services for example, only principals with access to the KMS vault will be able to decrypt information in an S3 bucket with KMS encryption enabled.

It is also possible to encrypt the data by using a customer-managed key, which has its advantages and disadvantages. The advantage is that it’s harder for a misconfiguration to accidentally allow access to the encryption keys, and that you don’t have to rely on the platform you are using to store them. However, using customer-managed keys means you need to send the keys over more frequently to the systems which encrypt and decrypt it, which increases the chance of the key being exposed.

Reducing Your Data Attack Surface by using Privileged Access Management Solutions

There are many tools that centrally manage access to databases. In general, they are divided into two categories: Zero-Trust Privilege Access Management solutions, and Database Governance proxies. Both provide protection against data leaks in different ways.

Zero-Trust Privilege Access Management solutions replace traditional database connectivity with stronger authentication methods combined with network access. Tools such as StrongDM and Teleport (open-source) allow developers to connect to production databases by using authentication with the corporate identity provider.

Database Governance proxies such as Satori and Immuta control how developers interact with sensitive data in production databases. These proxies control not only who can access sensitive data, but how they access the data. By proxying the requests, sensitive data can be tracked and these proxies guarantee that no sensitive information is being queried by developers. When sensitive data is queried, these proxies can either mask the sensitive information, or simply omit or disallow the requests ensuring that sensitive data doesn’t leave the database.

Reducing the data attack surface reflects the reality of the attackers mindset. They’re not trying to get into your infrastructure to breach the network. They’re doing it to find the sensitive data. By ensuring that sensitive data always is secured, tokenized, encrypted, and  with least privilege access, they’ll be nothing valuable for an attacker to find - even in the event of a breach. 

 

Discover Ron’s expertise, shaped by over 20 years of hands-on tech and leadership experience in cybersecurity, cloud, big data, and machine learning. As a serial entrepreneur and seed investor, Ron has contributed to the success of several startups, including Axonius, Firefly, Guardio, Talon Cyber Security, and Lightricks, after founding a company acquired by Oracle.

Subscribe

Latest Blog Posts

Ward Balcerzak
Ward Balcerzak
December 11, 2025
3
Min Read

US State Privacy Laws 2026: DSPM Compliance Requirements & What You Need to Know

US State Privacy Laws 2026: DSPM Compliance Requirements & What You Need to Know

By 2026, American data privacy will look very different as a wave of new state laws redefines what it means to protect sensitive information. Organizations face a regulatory maze: more than 20 states will soon require not only “reasonable security” but also Data Protection Impact Assessments (DPIAs), explicit limits on data collection, and, in some cases, detailed data inventories. These requirements are quickly becoming standard, and ignoring them simply isn’t an option. The risk of penalties and enforcement actions is climbing fast.

But through all these changes, one major question remains: How can any organization comply if it doesn’t even know where its most sensitive data is? Data Security Posture Management (DSPM) has become the solution, making data visibility and automation central for meeting ongoing compliance needs.

Mapping the New Wave of State Privacy Mandates

Several state privacy laws going into effect in 2025 and 2026 are raising the stakes for compliance. Kentucky, Indiana, and Rhode Island’s new laws, effective January 1, 2026, require both security measures and DPIAs for handling high-risk or sensitive data. Minnesota’s law stands out even more: it moves past earlier vague “reasonable” security language and mandates comprehensive data inventories.

Other key states include Minnesota, which explicitly requires data inventories, Maryland with strict data minimization rules, and Tennessee, which gives organizations an affirmative defense if they’ve adopted a NIST-aligned privacy program. These requirements mean organizations now need to track what data they collect, know exactly where it’s stored, and show evidence of compliance when asked. If your organization operates in more than one state, keeping up with this web of laws will soon become impossible without dedicated solutions (US consumer privacy laws 2025 update).

Why Data Visibility is Now Foundational to Compliance

To meet DPIA, minimization, and security safeguard rules, you need full visibility into where sensitive or regulated data lives - and how it moves across your environment. Recent privacy laws are moving closer to GDPR-like standards, with DPIAs required not only for biometric data but also for broad categories like targeted advertising and profiling. Minnesota leads with its clear requirement for full data inventories, setting the standard that you can’t prove compliance unless you understand your data (US cybersecurity and data privacy review and outlook 2025).

This shift puts DSPM front and center: you now need ongoing discovery and classification of your entire sensitive data footprint. Without a strong data foundation, organizations will find it hard to complete DPIAs, handle audits, or defend themselves in investigations.

Automation: The Only Viable Path for Assessment and Audit Readiness

State privacy rules are getting more complicated, and many enforcement authorities are shortening or removing 'right-to-cure' periods. That means manual compliance simply won’t keep up. Automation is now the only way to manage compliance as regulations tighten (5 trends to watch: 2025 US data privacy & cybersecurity).

With DSPM and automation, organizations get ongoing discovery, real-time data classification, and instant evidence collection - all required for fast DPIAs and responsive audits. For companies facing regulators or preparing for multi-state oversight, this means you already have the proof and documentation you need. Relying on spreadsheets or one-time assessments at this point only increases your risk.

Sentra: Your Strategic Bridge to Privacy Law Compliance

Sentra’s DSPM platform is built to tackle these expanding privacy law requirements. The agentless platform covers AWS, Azure, GCP, SaaS, and hybrid environments, removing both visibility gaps and the hassle found in older solutions (Sentra: DSPM for compliance use cases).

With continuous, automated discovery and data classification, you always know exactly where your sensitive data is, how it moves, and how it’s being protected. Sentra’s integrated Data Detection & Response (DDR) catches and fixes risks or policy violations early, closing gaps before regulators - or attackers - can take advantage (Sensitive data exposure insight). Combined with clear reporting and on-demand audit documentation, Sentra helps you meet new state privacy laws and stay audit-ready, even as your business or data needs change.

Conclusion

The arrival of new state privacy laws in 2025 and 2026 is changing how organizations must handle sensitive data. Security safeguards, DPIAs, minimization, and full inventories are now required - not just nice-to-have.

DSPM is now a compliance must-have. Without complete data visibility and automation, following the web of state rules isn’t difficult - it’s impossible. Sentra’s agentless, multi-cloud platform keeps your organization continuously informed, giving compliance, security, and privacy teams the control they need to keep up with new regulations.

Want to see how your organization stacks up for 2026 laws? Book a DSPM Compliance Readiness Assessment or check out Sentra’s automated DPIA tools today.

<blogcta-big>

Read More
David Stuart
David Stuart
Gilad Golani
Gilad Golani
December 4, 2025
3
Min Read

Zero Data Movement: The New Data Security Standard that Eliminates Egress Risk

Zero Data Movement: The New Data Security Standard that Eliminates Egress Risk

Cloud adoption and the explosion of data have boosted business agility, but they’ve also created new headaches for security teams. As companies move sensitive information into multi-cloud and hybrid environments, old security models start to break down. Shuffling data for scanning and classification adds risk, piles on regulatory complexity, and drives up operational costs.

Zero Data Movement (ZDM) offers a new architectural approach, reshaping how advanced Data Security Posture Management (DSPM) platforms provide visibility, protection, and compliance. This post breaks down what makes ZDM unique, why it matters for security-focused enterprises, and how Sentra provides an innovative agentless and scalable design that is genuinely a zero data movement DSPM .

Defining Zero Data Movement Architecture

Zero Data Movement (ZDM) sets a new standard in data security. The premise is straightforward: sensitive data should stay in its original environment for security analysis, monitoring, and enforcement. Older models require copying, exporting, or centralizing data to scan it, while ZDM ensures that all security actions happen directly where data resides.

ZDM removes egress risk -shrinking the attack surface and reducing regulatory issues. For organizations juggling large cloud deployments and tight data residency rules, ZDM isn’t just an improvement - it's essential. Groups like the Cloud Security Alliance and new privacy regulations are moving the industry toward designs that build in privacy and non-stop protection.

Risks of Data Movement: Compliance, Cost, and Egress Exposure

Every time data is copied, exported, or streamed out of its native environment, new risks arise. Data movement creates challenges such as:

  • Egress risk: Data at rest or in transit outside its original environment  increases risk of breach, especially as those environments may be less secure.
  • Compliance and regulatory exposure: Moving data across borders or different clouds can break geo-fencing and privacy controls, leading to potential violations and steep fines.
  • Loss of context and control: Scattered data makes it harder to monitor everything, leaving gaps in visibility.
  • Rising total cost of ownership (TCO): Scanning and classification can incur heavy cloud compute costs - so efficiency matters.  Exporting or storing data, especially shadow data, drives up storage, egress, and compliance costs as well.

As more businesses rely on data, moving it unnecessarily only increases the risk - especially with fast-changing cloud regulations.

Legacy and Competitor Gaps: Why Data Movement Still Happens

Not every security vendor practices true zero data movement, and the differences are notable. Products from Cyera, Securiti, or older platforms still require temporary data exporting or duplication for analysis. This might offer a quick setup, but it exposes users to egress risks, insider threats, and compliance gaps - problems that are worse in regulated fields.

Competitors like Cyera often rely on shortcuts that fall short of ZDM’s requirements. Securiti and similar providers depend on connectors, API snapshots, or central data lakes, each adding potential risks and spreading data further than necessary. With ZDM, security operations like monitoring and classification happen entirely locally, removing the need to trust external storage or aggregation. For more detail on how data movement drives up risk.

The Business Value of Zero Data Movement DSPM

Zero data movement DSPM changes the equation for businesses:

  • Designed for compliance: Data remains within controlled environments, shrinking audit requirements and reducing breach likelihood.
  • Lower TCO and better efficiency: Eliminates hidden expenses from extra storage, duplicate assets, and exporting to external platforms.
  • Regulatory clarity and privacy: Supports data sovereignty, cross-border rules, and new zero trust frameworks with an egress-free approach.

Sentra’s agentless, cloud-native DSPM provides these benefits by ensuring sensitive data is never moved or copied. And Sentra delivers these benefits at scale - across multi-petabyte enterprise environments - without the performance and cost tradeoffs others suffer from. Real scenarios show the results: financial firms keep audit trails without data ever leaving allowed regions. Healthcare providers safeguard PHI at its source. Global SaaS companies secure customer data at scale, cost-effectively while meeting regional rules.

Future-Proofing Data Security: ZDM as the New Standard

With data volumes expected to hit 181 zettabytes in 2025, older protection methods that rely on moving data can’t keep up. Zero data movement architecture meets today's security demands and supports zero trust, metadata-driven access, and privacy-first strategies for the future.

Companies wanting to avoid dead ends should pick solutions that offer unified discovery, classification and policy enforcement without egress risk. Sentra’s ZDM architecture makes this possible, allowing organizations to analyze and protect information where it lives, at cloud speed and scale.

Conclusion

Zero Data Movement is more than a technical detail - it's a new architectural standard for any organization serious about risk control, compliance, and efficiency. As data grows and regulations become stricter, the old habits of moving, copying, or centralizing sensitive data will no longer suffice.

Sentra stands out by delivering a zero data movement DSPMplatform that's agentless, real-time, and truly multicloud. For security leaders determined to cut egress risk, lower compliance spending, and get ahead in privacy, ZDM is the clear path forward.

<blogcta-big>

Read More
Charles Garlow
Charles Garlow
December 3, 2025
3
Min Read

Petabyte Scale is a Security Requirement (Not a Feature): The Hidden Cost of Inefficient DSPM

Petabyte Scale is a Security Requirement (Not a Feature): The Hidden Cost of Inefficient DSPM

As organizations scramble to secure their sprawling cloud environments and deploy AI, many are facing a stark realization: handling petabyte-scale data is now a basic security requirement. With sensitive information multiplying across multiple clouds, SaaS, and AI-driven platforms, security leaders can't treat true data security at scale as a simple add-on or upgrade.

At the same time, speeding up digital transformation means higher and less visible operational costs for handling this data surge. Older Data Security Posture Management (DSPM) tools, especially those boasting broad, indiscriminate scans as evidence of their scale, are saddling organizations with rising cloud bills, slowdowns, and dangerous gaps in visibility. The costs of securing petabyte-scale data are now economic and technical, demanding efficiency instead of just scale. Sentra solves this with a highly-efficient cloud-native design, delivering 10x lower cloud compute costs.

Why Petabyte Scale is a Security Requirement

Data environments have exploded in both size and complexity. For Fortune 500 companies, fast-growing SaaS providers, and global organizations, data exists across public and hybrid clouds, business units, regions, and a stream of new applications.

Regulations such as GDPR, HIPAA, and rules from the SEC now demand current data inventories and continuous proof of risk management. In this environment, defending data at the petabyte level is now essential. Failing to classify and monitor this data efficiently means risking compliance and losing business trust. Security teams are feeling the strain. I meet security teams everyday and too many of them still struggle with data visibility and are already seeing the cracks forming in their current toolset as data scales.

The Hidden Cost of Inefficient DSPM: API Calls and Egress Bills

How DSPM tools perform scanning and discovery drives the real costs of securing petabyte-scale data. Some vendors highlight their capacity to scan multiple petabytes daily. But here's the reality: scanning everything, record by record, relying on huge numbers of API calls, becomes very expensive as your data estate grows.

Every API call can rack up costs, and all the resulting data egress and compute add up too. Large organizations might spend tens of thousands of dollars each month just to track what’s in their cloud. Even worse, older "full scan" DSPM strategies jam up operations with throttling, delays, and a flood of alerts that bury real risk. These legacy approaches simply don’t scale, and organizations relying on them end up paying more while knowing less.

 

Cyera’s "Petabyte Scale" Claims: At What Cloud Cost?

Cyera promotes its tool as an AI-native, agentless DSPM that can scan as much as 2 petabytes daily . While that’s an impressive technical achievement, the strategy of scanning everything leads directly to massive cloud infrastructure costs: frequent API hits, heavy egress, and big bills from AWS, Azure, and GCP.

At scale, these charges don’t just appear on invoices, they can actually stop adoption and limit security’s effectiveness. Cloud operations teams face API throttling, slow results, and a surge in remediation tickets as risks go unfiltered. In these fast-paced environments, recognizing the difference between a real threat and harmless data comes down to speed. The Bedrock Security blog points out how inefficient setups buckle under this weight, leaving teams stuck with lagging visibility and more operational headaches.

Sentra’s 10x Efficiency: Optimized Scanning for Real-World Scale

Sentra takes another route to manage the costs of securing petabyte-scale data. By combining agentless discovery with scanning guided by context and metadata, Sentra uses pattern recognition and an AI-driven clustering algorithm designed to detect machine-generated content—such as log files, invoices, and similar data types. By intelligently sampling data within each cluster, Sentra delivers efficient scanning while reducing scanning costs.

This approach enables data scanning to be prioritized based on risk and business value, rather than wasting time and money scanning the same data over and over again, skipping unnecessary API calls, lowering egress, and keeping cloud bills in check.

Large organizations gain a 10x efficiency edge: quicker classification of data, instant visibility into actual threats, lower operational expenses, and less demand on the network. By focusing attention only where it matters, Sentra matches data security posture management to the demands of current cloud growth and regulatory requirements.

This makes it possible for organizations to hit regulatory and audit targets without watching expenses spiral or opening up security gaps.Sentra offers multiple sampling levels, Quick (default), Moderate, Thorough, and Full, allowing customers to tailor their scanning strategy to balance cost and accuracy. For example, a highly regulated environment can be configured for a full scan, while less-regulated environments can use more efficient sampling. Petabyte-scale security gives the user complete control of their data enterprise and turns into something operationally and financially sustainable, rather than a technical milestone with a hidden cost. 

Efficiency is Non-Negotiable

Fortune 500 companies and digital-first organizations can’t treat efficiency as optional. Inefficient DSPM tools pile on costs, drain resources, and let vulnerabilities slip through, turning their security posture into a liability once scale becomes a factor. Sentra’s platform shows that efficiency is security: with targeted scanning, real context, and unified detection and response, organizations gain clarity and compliance while holding down expenses.

Don’t let your data protection approach crumble under petabyte-scale pressure. See what Sentra can do, reduce costs, and keep essential data secure - before you end up responding to breaches or audit failures.

Conclusion

Securing data at the petabyte level isn't some future aspiration - it's the standard for enterprises right now. Treating it as a secondary feature isn’t just shortsighted; it puts your company at risk, financially and operationally.

The right DSPM architecture brings efficiency, not just raw scale. Sentra delivers real-time, context-rich security posture with far greater efficiency, so your protection and your cloud spending can keep up with your growing business. Security needs to grow along with scale. Rising costs and new risks shouldn’t grow right alongside it.

Want to see how your current petabyte security posture compares? Schedule a demo and see Sentra’s efficiency for yourself.

<blogcta-big>

Read More
decorative ball
Expert Data Security Insights Straight to Your Inbox
What Should I Do Now:
1

Get the latest GigaOm DSPM Radar report - see why Sentra was named a Leader and Fast Mover in data security. Download now and stay ahead on securing sensitive data.

2

Sign up for a demo and learn how Sentra’s data security platform can uncover hidden risks, simplify compliance, and safeguard your sensitive data.

3

Follow us on LinkedIn, X (Twitter), and YouTube for actionable expert insights on how to strengthen your data security, build a successful DSPM program, and more!

Before you go...

Get the Gartner Customers' Choice for DSPM Report

Read why 98% of users recommend Sentra.

Gartner Certificate for Sentra