Third-party data usage is everywhere. Enterprises share data or consume data from other vendors—the use of third-party data fuels business innovation.
Data sharing can be a shared cloud folder, an S3 bucket, API level contracts, a Snowflake table, a JDBC contract for a datastore, so many ways! When data is shared, how can one understand if the permissions for the sharing were being honored? What if critical data transactions happened with vendors, and what if such transactions started happening intermittently? What vendors read your business-critical data?
Getting the correct security posture towards vendor data sharing is essential for Cloud security strategy. Something we see in modern companies more than before.