Why Do Companies Fail at Data Security? Common Pitfalls and Solutions
This article examines why many enterprises repeatedly suffer data breaches, highlighting common security flaws such as manual permission management, account sharing, lack of least‑privilege, insufficient environment isolation, weak audit logging, and offers practical recommendations to strengthen information security.
Common Data Security Pitfalls
Recent incidents like the CrowdStrike outage and the Facebook password leak, where 600 million user passwords were stored in clear text and accessed by thousands of employees, illustrate that data‑security failures are industry‑wide, not isolated to a few companies.
Manual Permission Management
Many traditional internet companies manage permissions manually or through semi‑automated approval flows. This leads to problems such as:
Account sharing among small development teams, often using a single database account for many services, making it impossible to trace malicious actions.
Absence of least‑privilege, resulting in root‑like accounts that attackers can exploit.
Insufficient Environment Isolation
Production and testing environments are frequently not physically isolated, allowing engineers to access real user data during debugging. Combined with A/B testing and gray‑release practices, this creates a high risk of data leakage.
Delayed Permission Revocation
Without automated processes, permissions are rarely revoked promptly after an employee leaves or a role changes, leading to prolonged exposure. Manual revocation is error‑prone and often incomplete.
Internal Plaintext Communication
Many organizations assume internal networks are safe, yet large companies with thousands of machines share a single IDC. Unencrypted internal traffic enables attackers who obtain VPN credentials to sniff data.
Weak Data Access Controls
Traditional relational databases typically enforce only table‑level permissions, while modern workloads require column‑level or row‑level ACLs and RBAC. Open‑source database editions often lack these fine‑grained controls.
Missing Audit Logging
Without audit logs, it is impossible to determine whether a request involved sensitive data. Enabling audit logging and assigning minimal permissions to engineers allows detection of malicious or accidental misuse.
Data Forgetting (GDPR)
Regulations such as GDPR require complete deletion of user data upon request, which is difficult in distributed storage systems that rely on logical deletes. True data erasure usually requires enterprise‑grade features.
Practical Recommendations
Implement automated, least‑privilege permission management.
Enforce strict isolation between production and testing environments.
Adopt a Zero‑Trust model with TLS encryption for all internal communications.
Enable comprehensive audit logging and retain logs securely.
Use database solutions that support column‑level and row‑level access controls.
Provide genuine data‑deletion capabilities across all storage layers.
Key Takeaway
Security cannot be solved by management alone; it requires architectural changes, investment in proper tooling, and a culture that prioritizes data protection over short‑term cost savings.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
21CTO
21CTO (21CTO.com) offers developers community, training, and services, making it your go‑to learning and service platform.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
