The invention is a system to secure data. The data security system
includes data, a data security system enforcer, a local policy database,
and a centralized policy manager. When a block level file access request
is received, the data security system enforcer checks the local policy
database to see if the file access request is authorized. If the file
access request is authorized, then the file access request is performed.
Intrusions may be determined based on the type and number of unauthorized
file access requests. Forensic analysis may be performed on a database
logging file access requests (both authorized and unauthorized).