Homepage
All Cases
Hacking

Secure

Big Data Security in the tech industry

We were commissioned by a leading telecommunications company to develop a tailored IT security concept based on the security-by-design approach. The goal was to efficiently migrate large volumes of customer-related data from various sources into a central environment and ensure secure access to this data. With our comprehensive expertise in IT security, we successfully met the project's requirements.

Big Data Security

Initial Situation

Private and enterprise customers of telecommunications providers today expect tariffs that are as cost-efficient as possible and tailored to their individual needs. To offer its existing customers tariff adjustments based on a business intelligence (BI) analysis and to capture and assess individual customer performance, the tech company decided to implement advanced Big Data analytics and machine learning processes. The goal: to create a foundation for analyses that deliver benefits for both the customers and the provider.

One major challenge was establishing a central data repository that meets the high security requirements for critical data. Which cloud provider is the right one? Which provider meets the criteria in terms of privacy and security and offers the infrastructure to properly implement the desired architecture? To answer these security-related questions while maintaining compliance with applicable regulations, the tech company sought a qualified IT security partner. Based on recommendations from its own network, the company became aware of Cloudyrion and reached out to the IT security specialists. The key advantages of the Düsseldorf-based security experts: comprehensive consulting, technological expertise, and solution-oriented, pragmatic assistance from a single source.

Challenge

Although the company had already selected a Big Data environment, it had not yet undergone a security assessment. Therefore, a systematic reverse engineering approach was needed to ensure that the three key security-relevant areas in Big Data analytics were effectively addressed and covered:

  • Minimizing attack surfaces through configuration and vulnerability analysis
  • Secure data transmission
  • Secure data storage

Data encryption

The focus was on access permissions, data encryption during transmission, and data integration patterns that standardize which data can flow in and out and who has access to the data lakes (cold/warm storage) and BI tools. A practical framework for implementing secure role management was to be based on the „need-to-know“ principle, meaning that each individual working with the data only has visibility and access to what they need for their specific task. In Big Data environments, managing access permissions often tends to become confusing, which can be a dangerous situation.

Beyond the legal requirements, such as those embedded in the GDPR, data security is fundamentally a high priority. Once violations, negligence, or security incidents become public, the brand’s reputation is severely damaged and difficult to repair. Furthermore, compromising particularly sensitive data sets can significantly harm the company’s core business, potentially even threatening its survival. With a clear focus on security, supported by Cloudyrion, role management was to bring clarity regarding data security and compliance. The project’s timeline was set for six months, during which the high availability of data for authorized users was to be ensured at all times.

Solution

At the start of the project, Cloudyrion worked with the company to define the data integration patterns for the Big Data environment. The focus was on the logic behind the dashboards in use and who was authorized to modify them when necessary. The security experts provided guidance on the following topics, among others:

  • Establishing data transparency through a data asset inventory/data catalog (missing data discovery and mapping)
  • Data classification on four levels (C1 to C4)
  • Data protection (data leakage/loss prevention)
  • Secure data source integration and validation
  • Securing data lakes (ETL and ML pipelines)
  • Masking or anonymizing data sets
  • Creating an asset inventory in the form of a data catalog
  • Data retention management
  • Secure data backup
  • Identity access management

The central question for identity management was: Which roles exist? How are roles assigned, revoked, and released? How can the entire process be audited? It was important to ensure that all processes reviewed and, if necessary, adjusted according to the aforementioned methodology were compliance-relevant for the company.

In addition, the experts identified vulnerabilities and issues in the already implemented live environment, correcting them iteratively. Audits and penetration tests were conducted to find attack surfaces and close gaps. This process involved systematically reverse engineering through all layers, back to the original design of the solution, which was then adjusted based on the findings according to the security-by-design approach. To ensure the high availability of data and data lakes, the Big Data solution was originally deployed in a multi-cloud environment. Most common cloud service providers support this structurally, but their security tools tend to have a relatively high rate of false positives when identifying valid data patterns—an issue the team learned to handle with Cloudyrion’s support.

Future Outlook

After reaching the milestone set for the six-month period, the company extended Cloudyrion’s engagement to continue driving and monitoring the implementation of the security-by-design principles beyond the initial project timeframe. This deepened the trust between the client teams and the consultants. As a result, the company’s overall awareness of security issues increased significantly. This is also due to unannounced audits that Cloudyrion regularly conducts within the expanded system environment to continually identify and close vulnerabilities. In parallel, Cloudyrion remains available for support with particularly complex issues.

Benefits and Assessment

In practical terms, one challenge was teaching users the necessary skill set to work confidently with the system. However, the learning curve showed that this effort was worthwhile. „Security-related mistakes made by employees are typically not intentional but rather unconscious. The goal, however, must be to ensure that such errors never reach the production environment,“ explains Okay Güler, Founder & IT Security Consultant at Cloudyrion. „Our client and its staff particularly appreciate our solution-oriented approach and flexibility, which helps them develop and internalize security know-how in the Big Data context and sustainably anchor it in their processes.“

Key Results Overview

  • Secure data storage and access
  • Adherence to internal company policies
  • GDPR compliance
  • Implementation of „what good looks like“ data integration patterns
  • Significantly faster processes
  • Validation of incoming data with a security focus
  • Building security know-how among staff
  • Clear assignment of tasks and roles for users

Security that Drives Success

Integrate security into every layer of your business, ensuring sustainable innovation and resilience for long-term success. Get in touch with us today to schedule your first security review and take the next step toward a secure future.

Get in touch now

Insights

Insights

Zum Beitrag: Secure by Design: A Key Strategy for C-Level Leaders in Pragmatic Security
C-Level Secure by Design

Secure by Design

Secure by Design for C-Level

Secure by Design: A Key Strategy for C-Level Leaders in Pragmatic Security

C-level executives have the potential to transform security from a perceived barrier into an enabler of sustainable growth. Prioritizing a Secure by Design (SbD) approach ensures security becomes a proactive, integral part of development, reinforcing the organization’s posture without hindering progress

Read more
Zum Beitrag: Mastering Shift-Left Challenges with Secure by Design Approach
Shift-Left C-Level Meeting

Secure by Design

Unlocking the Full Potential of Shift-Left Security

Mastering Shift-Left Challenges with Secure by Design Approach

The Shift-Left approach, which emphasizes the early integration of security in the software development process, has become an essential component of modern cybersecurity strategies. However, its implementation comes with challenges. Secure by design expertise helps organizations overcome these obstacles and leverage security as a clear competitive advantage.

Read more
Zum Beitrag: Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)
SBOM Compliance

Secure by Design

Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)

Why SBOM is Critical for Compliance Under the EU Cyber Resilience Act (CRA)

The EU Cyber Resilience Act (CRA) introduces mandatory security requirements for software and connected products, placing Software Bill of Materials (SBOM) at the core of compliance. This new legislation, as part of the broader EU Cybersecurity Strategy, aims to enhance the security of products with digital elements across the European market.

Read more

CLOUDYRION combines IT security with a culture of security to empower your projects. Together, we develop secure architectures, processes, and solutions that perfectly support your cloud strategy and organizational culture.