K

Kathleen Martin

Guest
In part one of this two-part series, I presented the three most common “tried and failed” approaches that large enterprises take to implementing data access controls to increase security and enable compliance with evolving privacy regulations. The three failed approaches all reveal ways in which complexity is the enemy of security. Creating secure copies of data, defining policies as “views,” and using Apache Ranger to enable fine-grained access controls all lead to fragmentation and mounting complexity, opening the door to a data management nightmare, potential security gaps and compliance failures. Increasing complexity can also make it impossible to provide the right access to the right people at the right time, inhibiting business productivity and innovation.
In this follow-on article, I will discuss three additional lessons learned that many successful large enterprises have applied to reach that “sweet spot” where big data can be used responsibly, compliance can be automated, and data management can be made easier.
Lesson 1: Strive for a Single Source of Authoritative Data
The opposite of curating secure copies or views of data is the ability to implement dynamic data access policies on top of a single source of authoritative data. This is the foundation of a successful data access management program. A single source of truth eliminates the proliferation of redundant and ungovernable data silos – while making access management far simpler.
Continue reading: https://www.datanami.com/2022/04/13/finding-the-data-access-governance-sweet-spot/
 

Attachments

  • p0007630.m07276.tech_abstract_shutterstock_mydegage_300x212.jpg
    p0007630.m07276.tech_abstract_shutterstock_mydegage_300x212.jpg
    12.7 KB · Views: 11
  • Like
Reactions: Kathleen Martin