# Cyera Integration Use Cases

Euno's integration with [Cyera](https://www.cyera.io/) extends data security posture management (DSPM) beyond the data warehouse and into the business layer — where BI tools, dashboards, reports, and AI interfaces are the primary surface through which people interact with sensitive data every day.

***

## The Challenge

DSPM tools are highly effective at classifying sensitive data at rest — in warehouses, lakes, and storage systems. But risk doesn't stop there. The business-facing layer presents a blind spot that most security programs haven't fully addressed:

* BI tools and AI interfaces frequently rely on **shared service accounts**, making it impossible to determine who actually accessed sensitive data through a dashboard or report.
* **Downstream dependencies** — calculations, joined fields, aggregated metrics — often inherit sensitivity from source columns without it being tracked or flagged.
* Security teams lack the **audit trails and access context** needed to respond quickly to incidents or demonstrate compliance.
* Dashboards and reports that are **no longer actively used** may still be exposing sensitive data without anyone realizing it.

The result: your warehouse is classified, but the business layer is a governance gap.

***

## Better Together: Cyera + Euno

<figure><img src="https://3442486607-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fjd87LSzdZm6uu6WlpVMg%2Fuploads%2FJ40cKnU7nw6BLppj7hQ9%2Funknown.png?alt=media&#x26;token=e1cea98e-cc3f-40f0-9ef8-7108b62cec41" alt=""><figcaption></figcaption></figure>

Cyera classifies sensitive data in the warehouse. Euno propagates those classifications through **column-level lineage** into BI fields, dashboards, reports, and downstream assets — making it possible to see exactly where sensitive data travels, who uses it, and whether that access is appropriate.

Together, Cyera and Euno give security and data teams a continuous, automated view of sensitive data exposure across the full data-to-decision stack.

***

## Use Cases

### Faster Incident Response

When a sensitive data incident occurs, time to understanding is critical. With Euno's lineage mapped on top of Cyera's classifications, security teams can instantly trace which dashboards, reports, and pipelines are connected to the affected tables — and identify who accessed them and when. No manual investigation, no dead ends from shared accounts.

<figure><img src="https://3442486607-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fjd87LSzdZm6uu6WlpVMg%2Fuploads%2FE1Z4eZ9PSJYH1seFsOJp%2Funknown.png?alt=media&#x26;token=56d89725-e218-4895-b76e-e79d47550184" alt=""><figcaption></figcaption></figure>

### Stale Asset Detection

Unused dashboards and reports are easy to overlook, but they can represent a significant and silent exposure risk if they contain or reference sensitive data. Euno automatically surfaces BI assets that haven't been accessed recently but still expose Cyera-classified fields — giving data and security teams a clear list of assets to deprecate or restrict.

### Policy Enforcement in BI

Cyera's DSPM policies can now extend their reach into BI. When sensitive data flows into a dashboard or report, Euno generates real-time alerts so security teams can enforce access policies at the point of business consumption — not just at the warehouse level.

<figure><img src="https://3442486607-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fjd87LSzdZm6uu6WlpVMg%2Fuploads%2F0WRbzErTXKHO6moUgUOs%2Funknown.png?alt=media&#x26;token=635aeb21-6782-4cdb-950a-29e677ef5c47" alt=""><figcaption></figcaption></figure>

### Identity Enrichment

Shared service accounts mask real user activity. Euno resolves the individuals behind BI access and usage events, enriching Cyera's identity cards with business-layer context: which reports a user views, which dashboards they interact with, and which sensitive fields those assets expose. This gives security teams a fuller picture of each identity's data footprint.

### Safer AI Usage

As AI agents increasingly query and summarize enterprise data, ensuring they operate with appropriate security and privacy context becomes essential. Euno enriches the data context surfaced to AI agents with Cyera's sensitivity and classification metadata, reducing the risk of sensitive data being inadvertently exposed through AI-driven queries or responses.

***

## How It Works

Euno connects to Cyera via the Cyera API using OAuth client credentials. Once connected, Euno streams table and column metadata from Cyera's view of your datastores, identifying assets with active sensitivity classifications or data class assignments. Euno then maps these classifications onto the corresponding resources in its data model and traces them forward through column-level lineage — surfacing classification context wherever sensitive data flows downstream in your BI and analytics layer.

The integration can be scheduled to sync on a recurring basis, keeping classification and lineage context continuously up to date.

***

## Get Started

Ready to extend your DSPM coverage into the business layer?

* **Set up the integration** →[ Cyera Integration setup guide](https://docs.euno.ai/sources/data-security/cyera-integration)
