Under The Hood Of Data Security Posture Management