I recently joined the Data Engineering Podcast to talk about something I see over and over again: teams adopting powerful new data platforms, without a clear strategy for securing access. What follows are some key lessons from that conversation, plus insights from the field.
Modern data workflows, from ML models to real-time streams, have outgrown yesterday’s tools. So how do leading teams succeed while so many others are still stuck in the weeds? Let’s break down the hard truths, unexpected fixes, and lessons no whitepaper will ever tell you.
Identity in the Wild West of Data Platforms

Today’s data stacks are diverse and decentralized. That means identity and access control isn’t neat, it’s messy. Every platform (ML, streaming, warehousing) has its own approach, and integration is a challenge.
Key IAM Realities:
- Federated Identity: Use Okta, Entra ID, or Google Workspace to pass JWT/SAML credentials across services.
- Short-Lived Credentials: Replace static tokens with ephemeral certificates to reduce risk and improve traceability.
- Fine-Grained Access: Row- and column-level permissions are the new baseline—not just S3 buckets.
- Externalized Policies: Use tools like OPA, Rego, Cedar, or OSO to manage policies outside your app code.
Without centralized governance, privilege creep and audit gaps sneak in. Every new tool adds complexity. So your architecture must embed identity context from end to end.
Governance Starts with Culture (Not Just Tools)

The biggest barrier to effective data access governance? Not technology. Culture.
You can buy the best platforms in the world, but if your teams don’t understand or care about access controls, audits, or tagging sensitive data, it won’t matter.
What Works:
- Strong Leadership Buy-In: Governance needs champions beyond the security team.
- Metadata-Driven Catalogs: Tools like Open Metadata help tag, track, and enforce policies across your data estate.
- Attribute-Based Security: Implement row- and column-level controls using frameworks like OpenTDF and partition-based encryption.
- Operational Discipline: Enforce exception reviews and cross-team collaboration (e.g. brown bags, advisory boards).
I’ve seen incidents where a developer granted herself production DB access “just to save time”, and no one noticed for months. This isn’t a tooling problem. It’s a policy and oversight problem.
Machine Access, AI Agents, and What Comes Next

As we shift into more AI-driven architectures, managing non-human access is becoming just as critical as human access.
AI Adds New Risk Surfaces:
- OAuth Token Exposure: Some AI model context protocols launched with placeholder security, leaving OAuth tokens exposed.
- Long-Lived Credentials: Applications still rely on static credentials that never rotate, exposing huge attack surfaces.
- Lack of Provenance: You can’t protect what you can’t trace. Without metadata about what AI agents are doing (and who they’re acting for), you’re flying blind.
What Works:
- Use workload attestation and TPMs to verify where AI agents run.
- Bind short-lived PKI or JWT tokens to those workloads.
- Carry identity context from human to agent to data layer.
This not only reduces your attack surface, it gives your teams the audit trail and control they need to operate safely.
Practical First Steps for Data Teams
Not ready for fine-grained everything? Start here:
- Audit Every Service Account: Know what has access to what, and why.
- Rotate Credentials Frequently: Replace shared secrets with short-lived, auto-rotated credentials.
- Monitor Query Behavior: If a system usually returns 1,000 rows, a request for 1 million should trigger an alert.
- Log Everything, Usefully: Centralize your logging and make sure logs include user/service identity and context.
Too many organizations still rely on hope: hope that queries don’t exfiltrate data, hope that developers don’t cut corners, hope that someone’s watching the logs. Hope isn’t a strategy. Your first step to securing your organization should be creating a proactive identity and access management strategy that addresses vulnerabilities before they become issues.
TL;DR:
- Identity and access controls must be federated, contextual, and short-lived.
- Culture and policy are just as important as encryption and IAM tools.
- AI-driven access needs to be proven, constrained, and auditable.
- Governance only works when teams are aligned and equipped.
If you’re navigating any of this in your environment, reach out to our expert ICAM team today. We’ve earned the highest clearances in federal environments, including FedRAMP High and DoD IL5, and we apply that same federal-grade rigor to every client we support. Whether you’re in government or an enterprise in a regulated industry, we’re solving these identity and access problems every day, and we’d be glad to share what’s working.
About the Author

Matt Topper is the President and CEO at UberEther. With over two decades of experience designing secure identity systems for the federal government and regulated industries, he leads complex ICAM deployments that balance speed, scale, and compliance. Matt frequently speaks on topics like zero trust, data access governance, and modernizing IAM for AI and cloud-native environments.
Matt is widely recognized for his deep technical expertise and pragmatic approach to identity architecture, often bridging the gap between security requirements and real-world operational needs.