Cloud 101CircleEventsBlog
CSA's Continuous Audit Metrics Working Group is expanding! Help shape the future of cloud assurance.

Download Publication

An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Who it's for:
  • CISOs
  • VPs
  • Data Managers
  • All Members of an Identified Data Community

An Agile Data Doctrine for a Secure Data Lake

Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its utilization is paramount. As data has grown in volume, variety, velocity, and variability, the technology required to ensure its security, privacy, and cost-effective collection, storage, and retrieval is vital.
 
This report from CSA’s Top Threats Working Group and NTT DATA looks to address these concerns by examining how the critical points of data security and data privacy within a data lake are applied through the creation and fundamental principle of a data doctrine.
 
Key Takeaways:
  • What stands in the way of “good” ongoing data management of a data lake. 
  • The shared principles and responsibility of the “data community” to support the adoption of an established data doctrine.
  • How to apply the tenets of trust, lineage traceability, usage tracking, enabling discovery, data security, data obfuscation, auditability, performance, troubleshooting, retention/archiving/disposal, and monitoring to defined policies and implementation rules to support a data doctrine.
  • The significance of governance controls, roles, and responsibilities to adapt an agile data lake doctrine framework. 
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification ...
Secure Connection Requirements of Hybrid Cloud
Secure Connection Requirements of Hybrid Cloud
The Continuous Audit Metrics Catalog
The Continuous Audit Metrics Catalog
Other Practices Are Placing Greater Trust in AI... When Will Cybersecurity?
Other Practices Are Placing Greater Trust in AI... When Will Cybers...
Published: 02/22/2024
Practical Ways to Combat Generative AI Security Risks
Practical Ways to Combat Generative AI Security Risks
Published: 01/05/2024
How to Modernize Permissioning with the Cross-Cloud Solution Shaping the Future of IDaaS
How to Modernize Permissioning with the Cross-Cloud Solution Shapin...
Published: 11/30/2023
UPI is an Indian Success Story. Zero Trust Architecture Can Help Ensure It Stays That Way
UPI is an Indian Success Story. Zero Trust Architecture Can Help En...
Published: 11/21/2023
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training