Data Integration as a Security Control
The relationship between data integration and security is usually framed in one direction. The more consequential relationship runs the other way: data integration determines what can be seen, correlated, and acted on.
Part of the Phase II — Understanding series
By Michael E. Ruiz
The relationship between data integration and security is usually framed in one direction: security enables safe data integration. Protect the pipelines, encrypt the data in transit, authenticate the endpoints, control who can read what. These are legitimate and necessary concerns. But there is a second relationship that gets less attention, and it matters considerably more in environments where security decisions depend on information from multiple systems that have never been designed to communicate with each other.
Data integration is itself a security control when it determines what can be seen, correlated, and acted on. An organization that cannot join security event data with asset data, vulnerability data, and operational context is not just organizationally inconvenienced — it is operationally blind in specific ways that are predictable and exploitable.
The attacker who moves laterally through an OT environment while maintaining low traffic rates is less likely to be detected in an environment where network anomalies and asset context live in separate systems that no one has connected.
The problem is not that the data does not exist. In most mature environments, the telemetry is there: event logs, network flows, asset attributes, process data. The problem is that it lives in systems maintained by different teams, with different schemas, different update frequencies, different access controls, and no defined relationship between them. Security analytics tools that promise to correlate across these sources are only as good as the integrations connecting them, and those integrations are the hard part that vendor demonstrations consistently elide.
In industrial environments, the integration challenge is compounded by the operational data problem. Process historian data, DCS event logs, and safety system alarms are valuable inputs to security analysis because they provide the operational context that makes network anomalies interpretable. But they are maintained by operations teams who have legitimate concerns about security personnel having direct access to systems that control physical processes. Building an integration architecture that provides the data needed for security analysis without creating access paths that increase operational risk is a design problem that sits at the intersection of IT, OT, and security, exactly the intersection where organizational silos create the longest delays.
The architecture that works in practice separates data access from operational access. A read-only feed from the process historian into a security data lake, with specific tags and time ranges defined in consultation with operations, provides the context security analysts need without creating a path from the security infrastructure to the control network. This requires a conversation between security and operations that many organizations have not had, usually because no one has been explicitly accountable for having it. The conversation is technical on the surface and organizational in substance: what do you need, what can I give you, and what is the appropriate boundary between us?
Leadership should understand that the maturity of a security program is increasingly correlated with the quality of its data integration architecture. Not the sophistication of any individual tool, but the breadth and quality of the data feeding the analytical layer. Organizations that have solved the integration problem, even partially, can answer security questions that better-tooled organizations with siloed data cannot. The investments that enable this are not always labeled as security investments. Data governance, integration middleware, and operational data strategy belong to multiple functions and are typically funded accordingly. Making the security case for these investments requires speaking in terms of decision quality, not data volume.
These ideas are available as keynote presentations and executive briefings. Explore speaking topics →