Data Security
To help Google Cloud users better secure their data, we designed a Data Security Posture Management (DSPM) solution. This allows them to easily discover, classify, and protect their data while meeting compliance requirements. This also helps Google Cloud compete with other providers in the market.



Lets understand the data security space
Today's organizations handle a vast and diverse array of data flowing between numerous sources and destinations. This complexity introduces unprecedented security risks like Data Leaks, Insider Threats and Compliance and Accountability.
To understand this problem, lets imagine
Enable customers to discover and classify their data and enforce data security and compliance policies to ensure consistent protection and demonstrate compliance.

My Role
Lead UX Designer


As a Lead UX Designer for Data Security product in Google I was responsible for the end-to-end user experience, from research, ideation design to launch. I collaborated closely with cross-functional teams to deliver a successful MVP.
Partnered with 4 Product Managers, 2 Engineering Managers, 12 Engineers, 1 Program Manager, 1 UX Researcher, and 1 UX Writer.
My approach
01
Step
Empathize
Understand the user's needs, pain points, and context
02
Step
Conceptualize
Transform insights into ideas and shape a clear vision for the solution.
03
Step
Design
Bring the vision to life with user-centered design and iterative refinement.
01 Empathize
Interviewed representatives from various user groups (Data Engineers, Security Engineers, etc.) to understand their needs, pain points, and current workflows related to data security.
Investigated how users currently handle key tasks like data discovery, classification, governance, automation, and compliance.
Talked to Users
Data engineer
Compliance Manager
Privacy Manager
Securing data is a team effort and the involved personas like
Vulnerability Analyst
Data Security Engineer

Explored the Market
Analyzed the DSPM market, including competitor offerings (like Wiz), industry trends, and best practices.
Conducted a detailed competitive analysis of key players like Wiz, focusing on their features and user experience.

Explored the Market
Analyzed the DSPM market, including competitor offerings (like Wiz), industry trends, and best practices.
Conducted a detailed competitive analysis of key players like Wiz, focusing on their features and user experience.
Findings

Desire for a unified solution
Users expressed a strong desire for a single, unified platform that could handle all aspects of data security posture management, from data discovery and classification to compliance monitoring and remediation.


Demand for automation and intelligence
Users expressed a need for automation and AI-powered capabilities to streamline data security tasks, such as data discovery, risk assessment, and compliance monitoring.

Continuous compliance monitoring
Users expected continuous compliance monitoring and automated alerting to ensure ongoing adherence to relevant security and privacy regulations.

Expectation of clear visualizations and actionable insights
Users wanted a solution that could present complex security information in a clear and concise way, with actionable insights and recommendations to guide their decision-making.
Overall, our UX research revealed a strong demand for a GCP-native Data security product that addresses the limitations of existing products and meets the specific needs and expectations of Google Cloud users. These findings highlighted the importance of building a user-centered, AI-powered solution that simplifies data security management, fosters collaboration, and enables proactive risk mitigation.
02 Conceptualize

How Might We" questions
Sketch and storyboard
Map the User Journey
Define stages and touch-points
Connect with the GCP ecosystem
Facilitated series of workshop
Prototyping and Validation:
Low-fidelity prototypes
User flows and information architecture
Conceptual presentations


User Journey
Gain a comprehensive view of your data across all your cloud environments. Identify sensitive data, classify it by type and risk level, and understand its location and flow
Continuously monitor your data security posture. Receive alerts about potential threats, investigate security incidents, and take immediate action to resolve vulnerabilities and maintain compliance.
Effortlessly onboard your organization to the DSPM platform. Connect your cloud accounts, configure initial settings, and get ready to discover your data landscape.
Define your security and compliance policies. Establish clear boundaries for your data, configure automated security measures, and enforce your policies across your cloud environments.
Quickly address security issues with detailed insights and automated tools.
Onboard
Discover data
Set boundary and deploy posture
Monitor
Resolve


Two Different Approaches & A/B Testing to Validate


MVP Designs
Landing page that helps to discover and monitor data
Finalized approach B after validation with improved UX


Focus on the most critical data issues Quickly identify and address the most severe and frequent data security problems.
Top data security findings
Category
Severity
Critical
Medium
Findings
Highly sensitive data without CMEK
High or moderate sensitive data found in public data asset
Credentials found in ENV variables
High
Data access log (DAL) not enabled for sensitive data
High
Highly sensitive BQ tables without policy tags
Low
View all
120
90
24
12
11
Top postures with open findings
Posture
Findings
Data Access Governance Posture
250
Data Encryption Posture
110
Data Loss Prevention (DLP) Posture
100
Data Classification Posture
95
Data Security Compliance Posture
92
Page
1
of
5
Prioritize data security efforts See which data security areas need the most attention based on the number of findings.
Compliance insights
Indicates the portion of your data that is actively managed and protected.
% resources under
data governance
Apply posture
to increase data governance %
Data map explorer
Last refreshed April 4, 2024 at 12:42 AM UTC-7


Globally located
Data with single region
Data with multi-region
Data globally located
Findings
US-East-1
230
Resources
120
105
180
Findings
View
Data insights
Each bubble visually represents the quantity of a resource, its violation status, and its residency using color and size.
Leverage Gemini AI Capabilities
Automatically detect compliance violations
Provide actionable remediation guidance
Enable proactive prevention


Success Metrics
Rapid Adoption
Over 26 customers onboarded the DSPM product within the first 15 days of launch.
Feature Usage
The automated vulnerability scanning feature is used by 62% of customers on a weekly basis.
Positive User Feedback
Consistently high satisfaction scores in user surveys.