Embedded Analytics Security: A Comprehensive Review of Secure Embedded Business Intelligence Analytics
DOI:
https://doi.org/10.58425/ajt.v4i4.468Keywords:
Embedded analytics security, zero trust architecture, homomorphic encryption, role-based access control, data governance, AI, machine learning, business intelligence security monitoring, BIAbstract
Aim: The study aims to examine the security landscape of embedded analytics applications and to identify key threats and vulnerabilities associated with the integration of Business Intelligence and data visualization within business applications.
Methods: The research adopts an analytical review approach to assess security risks in embedded analytics environments. It evaluates common embedded BI architectures and examines existing security controls, governance mechanisms, and regulatory considerations relevant to data-driven business applications.
Results: The analysis identifies increased exposure to security risks arising from extensive use of embedded BI, including data breaches, unauthorized access, regulatory noncompliance, and unethical data use. The findings highlight gaps in security implementation and governance practices within embedded analytics deployments.
Conclusion: Embedded analytics significantly enhances real time decision making but introduces substantial security challenges. Addressing these challenges requires a structured approach that aligns technical safeguards with governance frameworks and regulatory requirements.
Recommendation: Organizations should implement robust technical controls, strengthen data governance practices, and align embedded analytics deployments with applicable regulatory frameworks to mitigate security risks and ensure secure and ethical use of Business Intelligence solutions.
References
Candela, L., Coro, G., Lelii, L., Panichi, G., Pagano, P. (2020). Data Processing and Analytics for Data-Centric Sciences. In: Zhao, Z., Hellström, M. (eds) Towards Interoperable Research Infrastructures for Environmental and Earth Sciences. Lecture Notes in Computer Science, vol 12003. Springer, Cham. https://doi.org/10.1007/978-3-030-52829-4_10
Balasubramanian, V. R., Pakanati, D., & Yadav, N. (2024). Data security and compliance in SAP BI and embedded analytics solutions. International Journal of All Research Education and Scientific Methods, 12(12). https://ijaresm.com/data-security-and-compliance-in-sap-bi-and-embedded-analytics-solutions
Ramalingam, S., & Borada, D. (2025). Compliance & data security in BI: Ensuring compliance and security in BI frameworks handling sensitive data. International Journal of Research in Modern Engineering & Emerging Technology, 13(3), 362–376. https://doi.org/10.63345/ijrmeet.org.v13.i3.23
Agarwal, S. (2025). Implementing role-based access control in cloud-native big data warehouses. International Journal of Research in Modern Engineering & Emerging Technology, 13(7), Article 1. https://doi.org/10.63345/ijrmeet.org.v13.i7.1
Atri, P. (2024). Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit. International Journal of Computing and Engineering, 5(4), 44–55. https://doi.org/10.47941/ijce.1920
TitanFile, “Securing Data in Transit with Encryption: The Ultimate Guide,” TitanFile Blog.
[Online]. Available: https://www.titanfile.com/blog/data-in-transit-encryption/
Karunakaran, S., & Vashishtha, S. (2025). Data governance, privacy and compliance for Business Intelligence solutions. International Journal for Research Publication and Seminar, 16(1), 248–264. https://doi.org/10.36676/jrps.v16.i1.134
Ethan, A., & Osaka, M. (2023, October). Driving Business Intelligence with Big Data and Data Governance. ResearchGate. https://www.researchgate.net/publication/375039481_Driving_Business_Intelligence_with_Big_Data_and_Data_Governance
Smith, M., & Patterson, D. (2025). Zero Trust Architecture: The future of network security. ResearchGate. https://www.researchgate.net/publication/394401116_ZERO_TRUST_ARCHITECTURE_THE_FUTURE_OF_NETWORK_SECURITY
Keir, J., & Shekhar, S. (2024). AI-Powered Identity and Access Management for Enterprise Cybersecurity. December 2024. In: [online]. Available via ResearchGate. (PDF) AI-Powered Identity and Access Management for Enterprise Cybersecurity
Alagbe, D., Oluremi, D., Mahmood, S., Liang, W., Osimitz, T., John, B., Marxuly, S., Popoola, V., Farfan, F., Herz, R., Taofeek, A., Barnty, B., Ramdurai, B., & Johnson, Mary B. (2025, October). Homomorphic encryption in distributed serverless ETL for privacy-preserving financial data analytics. (PDF) Homomorphic Encryption in Distributed Serverless ETL for Privacy-Preserving Financial Data Analytics
Luo, A., Khan, L., Long, M., & Okunola, A. (2024). Homomorphic Encryption for Secure Data Analytics. December 2024. In: [online]. Available via ResearchGate. (https://www.researchgate.net/publication/386573325_Homomorphic_Encryption_for_Secure_Data_Analytics
Kurii, Y., & Opirskyy, I. (2022, October). Analysis and comparison of the NIST SP 80053 and ISO/IEC 27001:2013. In Proceedings of CPITS2022: Cybersecurity Providing in Information and Telecommunication Systems. CEURWS.org. https://ceur-ws.org/Vol-3288/paper3.pdf
Wen, S.-F., & Katt, B. (2023). A quantitative security evaluation and analysis model for web applications based on the OWASP Application Security Verification Standard. Computers & Security, 135, 103532. https://doi.org/10.1016/j.cose.2023.103532
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Sangeetha Durairaju

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors retain the copyright and grant this journal right of first publication. This license allows other people to freely share and adapt the work but must give appropriate credit, provide a link to the license, and indicate if changes were made. They may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.






