Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Who it's for:
  • CISOs
  • VPs
  • Data Managers
  • All Members of an Identified Data Community

An Agile Data Doctrine for a Secure Data Lake

Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its utilization is paramount. As data has grown in volume, variety, velocity, and variability, the technology required to ensure its security, privacy, and cost-effective collection, storage, and retrieval is vital.
 
This report from CSA’s Top Threats Working Group and NTT DATA looks to address these concerns by examining how the critical points of data security and data privacy within a data lake are applied through the creation and fundamental principle of a data doctrine.
 
Key Takeaways:
  • What stands in the way of “good” ongoing data management of a data lake. 
  • The shared principles and responsibility of the “data community” to support the adoption of an established data doctrine.
  • How to apply the tenets of trust, lineage traceability, usage tracking, enabling discovery, data security, data obfuscation, auditability, performance, troubleshooting, retention/archiving/disposal, and monitoring to defined policies and implementation rules to support a data doctrine.
  • The significance of governance controls, roles, and responsibilities to adapt an agile data lake doctrine framework. 
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
AI Organizational Responsibilities - Governance...
A Vulnerability Management Crisis: The Issues with CVE
A Vulnerability Management Crisis: The Issues with CVE
Published: 11/21/2024
The Hidden Power of Zero Trust Thinking
The Hidden Power of Zero Trust Thinking
Published: 10/30/2024
How CSA Research Uses the Cloud Controls Matrix to Address Diverse Security Challenges
How CSA Research Uses the Cloud Controls Matrix to Address Diverse ...
Published: 10/25/2024
Reflections on NIST Symposium in September 2024, Part 2
Reflections on NIST Symposium in September 2024, Part 2
Published: 10/10/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training