Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

Veeamon Tour'26 - Data & AI Trust CONVERGE for the Agentic Era

View

DSPM for Multi-Cloud Environments: Best Practices To Consider

Play Video
Author

Anas Baig

Product Marketing Manager at Securiti

Published June 29, 2025 / Updated July 2, 2025

Listen to the content

Modern organizations are increasingly adopting multi-cloud environments, with over 98% already using a combination of various cloud services, according to a 2023 report by Cloud Security Alliance. This already astounding figure is further compounded by the fact that it’s a steep increase from 91% in 2020.

Enterprises are leveraging platforms such as AWS, Azure, and GCP, as well as multiple SaaS tools, to help optimize their performance, flexibility, and, of course, cost. However, this approach also introduces a combination of new risks and complexities, which extend to their sensitive data management as well. These include data silos, inconsistent access policies, and the lack of a unified visibility. However, all of these issues can be appropriately addressed via the adoption of DSPM.

DSPM, or Data Security Posture Management, refers to a modern data security framework designed to help organizations discover, classify, and protect their sensitive data assets across multi-cloud ecosystems. Not only can it continuously monitor data at rest and in motion, but it can also identify potential exposure risks, along with the necessary remedial measures to reduce these vulnerabilities.

Read on to learn more about the best practices when deploying DSPM in multi-cloud environments.

Best Practices For Deploying DSPM in Multi-Cloud Environments

Below are some of the best practices organizations can implement when deploying DSPM in their multi-cloud environments:

Start with High-Impact Use Cases & High-Risk Data

The deployment of the DSPM solution in a multi-cloud context must begin by identifying the most critical business data and its associated workflows. Such assets pose the most financial, reputational, and compliance risks if a breach or any sort of mismanagement were to occur. This can include personally identifiable information (PII), financial records, intellectual property, as well as regulated datasets that comply with regulatory standards, such as the GDPR, HIPAA, or PCI-DSS.

Hence, by alleviating the risks to such datasets, an organization can experience immediate risk reduction. Moreover, through this value-first approach, the teams working on the deployment can work out any operational kinks early on and gain buy-in for the subsequent DSP scaling. Essentially, rather than attempting to secure everything at once, which would be inefficient, an organization should prioritize securing its most critical assets first.

Define a Centralized DSPM Governance Model

Any DSPM deployment strategy, regardless of the context, will only be as successful as the governance structure supporting it. In this instance, with multiple cloud providers involved, an inconsistent set of policies, in addition to siloed decision-making, can undermine the entire thing, regardless of how good the technology is. Hence, it is necessary to have a central governance model that communicates and defines DSPM ownership, data classification standards, remediation workflows, and relevant escalation paths.

However, a centralized governance model does not mean a “one-size-fits-all” approach but rather a shared framework on how the DSPM tools are to be configured, monitored, and deployed while allowing for role-based customization wherever necessary.

Integrate DSPM Into DevSecOps Pipelines

Embedding the DSPM solution into DevSecOps pipelines enables proactive data protection, allowing exposure risks to be identified and mitigated early in the development lifecycle, long before they reach production. This can be particularly critical in cloud-native environments, where developers leverage multiple services. Integration of DSPM with such tools allows for automated scans of all infrastructure-as-code templates, databases, and APIs for any signs of data exposure.

Moreover, this arrangement fosters a culture of security by design, where misconfigurations or data classification issues are identified in real time by engineers, reducing operational friction through the automated detection and enforcement of policy guardrails without impacting innovation within the firm.

Leverage Automated Discovery to Reduce Friction

Traditional security tools rely on invasive agents or manual configurations. These not only act as roadblocks to proactive deployment but also introduce various maintenance-related burdens. DSPM solutions offer automated discovery through API integrations via cloud service providers. Through these tools, sensitive data can be effectively mapped, along with access privileges and the overall risk exposure of each asset, without exposing that data to individual software.

This also enables rapid time-to-value by providing instant visibility across the storage infrastructure. More importantly, this helps identify shadow data and ensure that nothing remains hidden or falls through the cracks, as it would if traditional tools were deployed.

Continuously Refine Policies Based on DSPM Insights

DSPM is not, and must not, be considered a static solution. It requires consistent and continuous improvement, and the environment continues to evolve, with new data sources, users, and risks emerging. DSPM insights must be analyzed to fine-tune classification policies and make necessary updates to the risk threshold, as well as the overall remedial playbook.

Moreover, the dashboards and alerts must not only be reviewed for incident responses but also for proactive governance, and they can often indicate problems that may not seem troublesome now but may become so if left unaddressed. Continuous refinement enables the DSPM solution to evolve in tandem with the cloud adoption strategy, fostering a proactive security posture.

Conclusion

DSPM offers organizations a data-centric security approach that focuses on the organization’s granular data assets rather than macroscopic infrastructure-centric monitoring. Furthermore, DSPM is optimized to address the various data security and privacy-related issues concerning sensitive data. It can identify and mitigate all issues in such assets directly, wherever they are stored, across multiple cloud environments and workloads.

Request a demo today and learn more about how DSPM can help your organization’s cloud and overall data security posture.

Frequently Asked Questions (FAQs)

Some of the most commonly asked questions related to DSPM in multi-cloud environments include the following:

DSPM solutions can be easily integrated into cloud service providers such as AWS and Azure through various APIs. This enables continuous and automated discovery of data assets across storage devices, databases, and SaaS platforms as they automatically scan and analyze data at rest and in motion to identify sensitive attributes such as PII, PHI, and IP. This is achieved through predefined or customizable classification policies.

Multi-cloud introduces various complexities due to different security models, visibility gaps, and fragmented data governance methods across providers. DSPM can serve as a unifying layer, providing security teams with comprehensive and holistic insight into where sensitive data is stored, who has access to it, and how exposed it really is. Through these insights, consistent security controls can be enforced.

DSPM tools utilize various native API integrations that scan and analyze structured and unstructured data assets across public clouds, SaaS applications, and hybrid environments. At this point, various data classification methods can be leveraged to detect sensitive data and provide a comprehensive overview of the entire data storage infrastructure.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Opt-Outs That Stick: Consent Withdrawal Across Marketing, SaaS & GenAI
Securiti's whitepaper provides a detailed overview of various consent withdrawal requirements across marketing, SaaS, and GenAI. Read now to learn more.
View More
The Hidden Privacy Cost of Shadow AI & Shadow Data
Download the whitepaper to discover the risks of Shadow AI and Shadow Data, why traditional controls fail, and how to build proactive, scalable AI...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New