
Operationalizing Data Risk Remediation
A DSPM that identifies sensitive data exposure is useful only if the findings produce action. Bedrock compresses the investigation work that stands between a finding and a fix, so remediations that should take minutes actually do.
Jeremy Linden
VP, Product
Share:
A DSPM that identifies sensitive data exposure is useful only if the findings produce action. Most do not. The DSPM surfaces a finding. The finding sits in a dashboard. Weeks later, the same finding is still there, now with a few more like it.
The reason is not that remediation is technically hard. Once a human with the right access has the right context, the action itself takes minutes, whether that means revoking a sharing link, tightening a bucket policy or applying a masking tag. The expensive part is what happens before the action: figuring out what the data actually is, who can reach it through which path, who should be able to reach it, what depends on it, what policy makes it a problem and what breaks if you change it. Investigation, not action, is where time goes. A remediation program that does not optimize for investigation throughput will not scale, regardless of how much of the action it automates.
This piece is organized around three models of action (direct remediation, tagging-based control and human-directed remediation) because the action itself still has to be chosen correctly. But the action is the short part. Everything that makes a remediation program work or fail lives in the investigation step before it and the ownership decision around it. We will return to that thread in each section.
A note on framing. The three models below are sometimes presented as a SaaS/IaaS/PaaS taxonomy. That mapping is correlated, not causal. The variables that drive the decision are blast radius, reversibility and dependency depth, which are properties of the specific finding rather than properties of the platform it lives on. A SharePoint sharing change can have an enormous blast radius if it touches an active M&A deal room. An IAM change in a developer sandbox can have almost none.
Direct Remediation
Direct remediation is appropriate when the change is reversible, the dependency graph is shallow and the finding is unambiguous. The canonical case is a SaaS collaboration finding: an HR document shared with a group whose membership now includes people outside HR, widening exposure beyond the corporate policy that scopes HR data to HR. Investigation identifies the over-broad group; the action is to revoke the group from the file's permissions. The DSPM executes the change through the platform's API and validates that the exposure has closed.
This model is efficient when the conditions hold. The conditions do not always hold in SaaS. An executive's "Anyone with link" share to an active deal team has a high blast radius even on a collaboration platform. A shared OneDrive folder that looks personal may be the working directory for a cross-functional project. The failure mode of direct remediation is the case that looks routine from the DSPM's perspective and was load-bearing for a business process no one documented. The remediation succeeds. The business breaks. The security team gets a call from a VP.
The decision to remediate directly therefore belongs to investigation rather than to a platform-typed policy. The DSPM has to surface enough context (current shares, recent access activity, the principals who have actually been reading the file, the explicit data owner property where the platform exposes one) that the system or the assignee can confirm the change is safe before executing. Direct remediation without investigation is auto-remediation, and auto-remediation in environments with even moderate dependency depth is a way to generate incidents at machine speed.
Tagging-Based Control
For platforms whose native classification labels are bound to enforcement controls, tagging is the cleanest available remediation model. The label is the control. The DSPM's job is to categorize the data correctly and apply the platform's label that confers the intended enforcement. The platform's access control system handles the rest.
In Snowflake, this looks like an object tag on a column containing customer PII, with a masking policy attached to the tag. Users without the appropriate role see masked values, the pipeline reading the underlying data continues to function and the sensitive data is never duplicated or moved. In Microsoft 365, this looks like a Purview sensitivity label configured to block external sharing, applied to an HR document classified as restricted. Once the label is applied, the platform enforces. There is no separate enforcement step the DSPM has to execute. The remediation reduces to a categorization decision around whether this data warrants this label, and the platform takes the rest.
This is the model that scales best when it applies, because the DSPM is doing the part it is uniquely positioned to do (categorization based on the data itself plus business context) and delegating the part the platform is uniquely positioned to do (enforcement based on a label).
The model fails in three predictable ways. The first is label scope. A Snowflake masking policy applied through a tag enforces on the table where the tag sits, and the behavior on clones, shares and replicated objects depends on how the policy is scoped. Programs that have not thought through clone behavior discover holes months later. The second is label drift. When ownership of the label taxonomy is unclear, labels accumulate, overlap and contradict, and the meaning of "restricted" stops being consistent across the organization. The third is configuration assumptions. A Purview label only blocks external sharing if a policy is in place to make it block external sharing, so the DSPM applying the label correctly does not help if the policy behind the label has been weakened.
Tagging-based control works when the categorization is right and the platform-side configuration is right. The DSPM owns the first. The organization owns the second. The remediation program has to verify both.
Human-Directed Remediation
For findings where reversibility is uncertain or the dependency graph is deep, the right model is to produce an enriched ticket and let a human with the necessary context execute the change. Most IaaS findings fall here. So do SaaS findings with high blast radius and PaaS findings that touch dependencies the DSPM cannot see.
The model fails badly when the ticket is bad. A ticket that says "S3 bucket contains sensitive data" is closed without resolution because the assignee does not know which bucket, which data, which policy or which principals. A ticket that says "S3 bucket acme-prod-analytics contains 1,247 records with unmasked SSNs, accessible via IAM policy attached to role data-pipeline-reader, which has been read from by two principals in the last 30 days, and the bucket is owned by the analytics team per account tags" gives the assignee everything needed to act. The model matters less than the explicitness.
Explicitness alone is not enough, and this is where most human-directed programs degrade. An enriched ticket assigned to the wrong owner still rots. A perfectly contextualized finding sitting in a platform team's Jira queue behind six weeks of infrastructure work is functionally identical to no remediation at all. The most common operational failure here is not the quality of the ticket. It is that DSPM findings get routed to the SOC by default, because the SOC owns alerts in most organizations, and the SOC does not have the platform permissions, the business context or the queue capacity to investigate data exposure findings at depth. The program stalls, the SOC resents it and the data exposure persists.
The second common failure is the action that breaks the pipeline. Investigation has surfaced the finding but missed a downstream consumer. The platform owner tightens the bucket policy. The pipeline fails silently. A downstream dashboard stops updating. A nightly ETL job that populates a reporting database produces empty tables. The remediation created a new incident. Activity lineage on the finding, meaning which principals have actually been reading this bucket, what processes touch it and what derives from it, does most of the work in catching this before the action runs. A human-directed ticket without activity lineage is a guess in formal clothing.
Human-directed remediation is the model with the most failure surface, and the one where the DSPM earns its keep by removing as much investigation cost as possible from the human at the end of the workflow.
Ownership, Routing and Time
The three models above describe how the action happens. The operational program around them depends on something the action models do not handle on their own: who the finding belongs to, and how fast it has to be resolved.
The most common operational failure in remediation is a missing owner. Every finding needs a named technical owner who can execute the change and a named business owner who can validate intent. Routing that depends on a human looking at a dashboard and deciding who should handle a given finding will not scale past a few hundred findings. Some platforms make routing easier. Microsoft 365 and Google Workspace expose explicit owner properties on shared files and drives, and these are sometimes the right routing target for SaaS findings. Most IaaS environments do not, and account-level tagging conventions become the routing signal. In large enterprises, platform-based ownership (all AWS findings to the cloud team) breaks down quickly because no central team has enough business context across hundreds of accounts. Account- or business-unit-based ownership scales further, but only if the ownership metadata is reliable.
Two principles cut across the routing decision. First, DSPM findings should not land on the SOC. They are not SIEM alerts, the people who handle them are not SOC analysts, and treating them as alert traffic produces a queue that nothing can drain. Second, the common thread under every routing decision is business context. Ownership without business context routes findings to people who cannot evaluate them. Action without business context produces remediations that break things.
Time matters too. Many remediations run on a regulatory clock (PCI DSS 4.0, HIPAA, GDPR Article 32, state breach notification laws), and the operational program has to surface those findings against their actual deadlines rather than in a single undifferentiated queue. The integration between the DSPM and the ticketing system has to support priority and SLA fields the receiving team actually reads. If the ticket lands in Jira with no SLA marker on a deadline-driven finding, the finding will be worked in order of arrival.
Validation closes the loop. For every action, whether direct, tagged or human-directed, the DSPM has to re-observe the data and confirm that the exposure has closed. A revoked share has to be confirmed against the platform's sharing state rather than trusted to a ticket status. A bucket policy change has to be re-evaluated against effective permissions rather than just policy text. A masking tag has to be verified in the platform's enforcement state rather than just on the DSPM side. Remediation without validation is remediation that produces a false sense of resolution.
What this means in practice
The directional evidence on this points the same way. IBM's 2025 Cost of a Data Breach report places the mean breach lifecycle at 241 days, with 158 to identify and 83 to contain. Breach response is not DSPM remediation, but the shape is consistent with what we see at finding-level resolution. Identifying the problem at sufficient depth to act dominates the time to act. The remediation program's job is to compress the first arrow, not just to automate the second.
That means the DSPM has to do four things well, and the action models above are the smallest of them. It has to categorize data with enough context to assign business categories rather than just match patterns. It has to resolve the full access path from the data outward, including IAM chains, sharing inheritance, role grants and the principals that have actually been reading the data. It has to surface that context on the finding, in the ticket, so the assignee answers the six investigation questions inside the workflow instead of across six tools. And it has to validate that the action closed the exposure, in the platform's own state.
In DSPM, the model matters less than the explicitness. The most common failure mode is a missing owner. And data environments do not hold still while tickets are worked. The shortfall isn’t technological; it’s operational.