Can My Embedded Analytics Software Integrate With My Security?

Can My Embedded Analytics Software Integrate with my Security?

Previously, we picked apart a few key things to understand when embedding dashboards inside your application. When it comes to this chapter, we’ll break down a few key things to know about choosing the right embedded analytics software that will integrate well with your existing security measures and processes.

Can My Embedded Analytics Software Integrate With My Security?

Definitions

In this chapter, it might help to brush up on the following definitions:

SOC 2 – Service Organization Control 2 is an auditing procedure that verifies that one’s service providers manage data securely.
ISO:27001 – A specification for information security management systems to ensure that all policies and procedures are legal.
HIPPA – Health Insurance Portability and Accountability Act of 1996. A U.S. federal law ensures that medical patient confidentiality is protected.
FERPA – Family Educational Rights and Privacy Act. Designed to protect the privacy of students and parents in terms of educational records.
GDPR – General Data Protection Regulation. The EU established an internet regulation to ensure that user website data is protected and behind an opt-in screen.
CCPA – California Consumer Privacy Act of 2018. A U.S. state law protects private consumer information from being illegally used by websites on behalf of consumers in California.

Here’s What You Need To Know

What are the security standards supported by the embedded analytics software?

To properly answer this question for your unique situation, it’s necessary to determine if you will use a self-hosted or cloud-based BI platform.

With a cloud BI platform, you’ll be responsible for integrating with a third-party BI vendor. That vendor’s existing security measures will be a critical party of your application, which can be a good or bad thing, depending on the quality of the vendor’s security measures.

In most cases, a cloud BI vendor will need you to copy all of your app’s data into their cloud or caching layer within their cloud. The vendor’s data protection measures must comply with several internet regulations, such as SOC 2, ISO:27001, HIPPA, FERPA, GDPR, CCPA, etc. Always establish a data processing agreement with your vendor before signing a contract with them.

With a self-hosted BI platform, things are simpler, but you have more of a responsibility for user data. It will be your responsibility to establish security measures, infrastructure, and processes to stay compliant and protect your end users’ privacy within the app. When building such as infrastructure, consider the following:

It should store your user and database passwords securely.

  • Your BI platform should support oAuth2 if you plan on using API-based integrations.
  • Your chosen platform should support transparent data encryption (TDE) at a minimum.
  • An established plan of action for data protection, either on your part or the vendor’s part, should be determined for caching and transit functions.
  • Utilize the most efficient server hardening for your use case.
  • Penetration testing should be used regularly against the BI platform’s APIs or software on standard servers. You should conduct this testing yourself or require the vendor to send proof of testing and results.

What are the security methods of the embedded BI platform?

There are a few security methods that your embedded BI platform should implement, or you will need to build these features yourself:

  • Single sign-on
  • Seamless login
  • Security roles such as viewer, builder, admin, data layer administrator, etc.
  • Data-level security types
  • Column-level security types
  • Audit log and data governance types

Conclusion

With a cloud-hosted BI platform, it will be necessary to verify the security protocols of the vendor. With a self-hosted BI platform, you will need to build your compliant security infrastructure.

What you choose comes down to your chosen vendor’s overall quality and unique budget for building a security infrastructure.

Of course, it is still important that your embedded analytics do not stray away from the brand you have kept so well for now. The next chapter will tell you everything you must know about customizations for embedded analytics that do not erase your brand from the picture.

Business Intelligence For Companies Ready To Grow

Copy link