Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Who it's for:
  • CISOs
  • VPs
  • Data Managers
  • All Members of an Identified Data Community

An Agile Data Doctrine for a Secure Data Lake

Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its utilization is paramount. As data has grown in volume, variety, velocity, and variability, the technology required to ensure its security, privacy, and cost-effective collection, storage, and retrieval is vital.
 
This report from CSA’s Top Threats Working Group and NTT DATA looks to address these concerns by examining how the critical points of data security and data privacy within a data lake are applied through the creation and fundamental principle of a data doctrine.
 
Key Takeaways:
  • What stands in the way of “good” ongoing data management of a data lake. 
  • The shared principles and responsibility of the “data community” to support the adoption of an established data doctrine.
  • How to apply the tenets of trust, lineage traceability, usage tracking, enabling discovery, data security, data obfuscation, auditability, performance, troubleshooting, retention/archiving/disposal, and monitoring to defined policies and implementation rules to support a data doctrine.
  • The significance of governance controls, roles, and responsibilities to adapt an agile data lake doctrine framework. 
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification ...
Secure Connection Requirements of Hybrid Cloud
Secure Connection Requirements of Hybrid Cloud
Building a SOC for Compliance
Building a SOC for Compliance
Published: 04/11/2024
The Secret to Supercharging LLMs: It's Not Answers, It's Questions
The Secret to Supercharging LLMs: It's Not Answers, It's Questions
Published: 04/10/2024
The Modern Data Stack Has Changed the Security Landscape
The Modern Data Stack Has Changed the Security Landscape
Published: 04/05/2024
CSA Turns 15: Kicking Off the Next 85 Years of Cloud Security Excellence
CSA Turns 15: Kicking Off the Next 85 Years of Cloud Security Excel...
Published: 04/04/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training