ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Download Publication

An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Who it's for:
  • CISOs
  • VPs
  • Data Managers
  • All Members of an Identified Data Community

An Agile Data Doctrine for a Secure Data Lake

Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its utilization is paramount. As data has grown in volume, variety, velocity, and variability, the technology required to ensure its security, privacy, and cost-effective collection, storage, and retrieval is vital.
 
This report from CSA’s Top Threats Working Group and NTT DATA looks to address these concerns by examining how the critical points of data security and data privacy within a data lake are applied through the creation and fundamental principle of a data doctrine.
 
Key Takeaways:
  • What stands in the way of “good” ongoing data management of a data lake. 
  • The shared principles and responsibility of the “data community” to support the adoption of an established data doctrine.
  • How to apply the tenets of trust, lineage traceability, usage tracking, enabling discovery, data security, data obfuscation, auditability, performance, troubleshooting, retention/archiving/disposal, and monitoring to defined policies and implementation rules to support a data doctrine.
  • The significance of governance controls, roles, and responsibilities to adapt an agile data lake doctrine framework. 
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Secure Agentic System Design: A Trait-Based Approach
Secure Agentic System Design: A Trait-Based App...
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
From Aware to Actionable: Closing the Cloud Security Resilience Gap
From Aware to Actionable: Closing the Cloud Security Resilience Gap
Published: 08/07/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training