ChaptersCircleEventsBlog
Improve the quality of your STAR Level 1 self-assessment by submitting to Valid-AI-ted →

Download Publication

An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Who it's for:
  • CISOs
  • VPs
  • Data Managers
  • All Members of an Identified Data Community

An Agile Data Doctrine for a Secure Data Lake

Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its utilization is paramount. As data has grown in volume, variety, velocity, and variability, the technology required to ensure its security, privacy, and cost-effective collection, storage, and retrieval is vital.
 
This report from CSA’s Top Threats Working Group and NTT DATA looks to address these concerns by examining how the critical points of data security and data privacy within a data lake are applied through the creation and fundamental principle of a data doctrine.
 
Key Takeaways:
  • What stands in the way of “good” ongoing data management of a data lake. 
  • The shared principles and responsibility of the “data community” to support the adoption of an established data doctrine.
  • How to apply the tenets of trust, lineage traceability, usage tracking, enabling discovery, data security, data obfuscation, auditability, performance, troubleshooting, retention/archiving/disposal, and monitoring to defined policies and implementation rules to support a data doctrine.
  • The significance of governance controls, roles, and responsibilities to adapt an agile data lake doctrine framework. 
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Dynamic Process Landscape: A Strategic Guide to Successful AI Implementation
Dynamic Process Landscape: A Strategic Guide to...
Agentic AI Red Teaming Guide
Agentic AI Red Teaming Guide
Shadow Access and AI
Shadow Access and AI
AI Agents vs. AI Chatbots: Understanding the Difference
AI Agents vs. AI Chatbots: Understanding the Difference
Published: 06/16/2025
Runtime Integrity Measurement Overview
Runtime Integrity Measurement Overview
Published: 06/13/2025
The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters Now More Than Ever
The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters ...
Published: 06/12/2025
LLMs Writing Code? Cool. LLMs Executing It? Dangerous.
LLMs Writing Code? Cool. LLMs Executing It? Dangerous.
Published: 06/03/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training