How Cloud Computing Changes Data Governance Strategies

Cloud computing is the next generation “analytic data infrastructure,” according to a study recently published by Dresden Advisory Services. 
 
Whether on-premises, private, hybrid or multi-cloud, organisations taking advantage of cloud benefits require an alternative data governance approach. 
 
Even with the promise of cloud improving data availability, Dresner’s report indicates nearly 50 percent of those surveyed have difficulty “locating and accessing data,” and in a new report on data catalogs, there is a “direct relationship” between those that have a catalog and the perceived success of “BI initiatives.” 
 
Why? Potentially Several Reasons: 
 
1. Proliferation of disparate data that may be co-located, but not necessarily integrated.
2. Plethora of technologies and APIs that provision, consume or syndicate data, including open source software, many of which have limited metadata capabilities.
3. Security monitoring to continuously assess threats and vulnerabilities.
4. Distributed protection of personal and other sensitive data.
5. Dissimilar complex supply chain workflows that could create data anomalies.
6. Third-party applications that cannot be integrated.
7. Insatiable demand for more information.
8. Burgeoning data diversification.
9. Analytic complexity.
10. More onerous regulatory, audit, and compliance requirements.
 
Cloud is a multiverse – a confederation of distributed apps. But regardless of a cloud implementation approach, while some apps may be co-located, they are not necessarily integrated. Therefore, the cloud often complicates data management by creating distributed, non-integrated data environments, which require more governance, not less.
 
If data governance is yet to be an inherent part of cloud planning, strategy, design, and implementation, then addressing challenges like those above are harder. 
 
Like with all new technologies there is an adoption, activation and adaptation cycle. Today, cloud benefits are self-evident, and the uptake will accelerate. This article isn’t about cloud virtues, but why data governance, to increase data availability and accessibility, is essential for cloud enablement. 
 
Some things don’t change, including traditional data governance concerns such as charter, scope, principles, organization, roles, responsibilities, operating model, etc. 
 
So what does change? Several things:
 
Data polices – Are they sufficient to address security, storage, syndication, regulatory, and retention requirements? If such data management policies exist, are they consistently followed across the enterprise?
Data quality – Is the data improved as result of legacy app to cloud migration? Are the business rules documented, and consistently applied? 
Data architecture – Are changes to conceptual, logical, and physical models coordinated and synchronised? 
Data security – Is the data consistently protected wherever it is stored? Does the data conform to security policies?
Data stewardship – Does all of the cloud data have a steward? That is, someone who is accountable for the integrity of the data wherever it originates, and is stored or processed? 
Data science – How are models effectively managed in the distributed environment? Are quants using the same data consistently? How can cloud improve quant productivity?
Data management and operational procedures – How will cloud impact data archiving, backup, recovery, business continuity? What is the impact on service and operating levels?
Master data and metadata management – Is the data defined well enough to be understood by all stakeholders? Does the data have consistent format, rules, etc.
DevOps – Is the development methodology, data transformation, data integration approach, operational procedures, and gate reviews sufficient to prevent data anomalies? 
Technical Architecture – Introducing and integrating cloud stack(s) with existing stack(s) also presents challenges. Not all stacks are created equal, and given the nascent nature of many of new technologies, are performance expectations adequately managed?
 
One other ADI characteristic often overlooked is financial management. For example, what are the implementation, consumption, maintenance and support costs? Would chargeback improve cost allocation? So what?
 
Dresner’s findings suggest a “strong correlation” between those organizations that have a catalog and BI success. For many organisations, with hundreds, if not thousands of disparate systems, often distributed across heterogenous platforms, knowing and keeping track of what data exists where is very difficult. 
 
Clearly, finding data, and remediating data anomalies, cannot be performed manually. Therefore, automation and orchestration are the only reasonable, practical solutions to intelligently address quality issues for “data in motion,” and catalog key “data at rest.” 
 
Without sophisticated analytics, improving data quality is daunting. 
Through the use of advanced “scanners,” organisations can automatically catalog and classify all types of data, making sense of both similar and dissimilar data, and storing this information in a central metadata repository, which can be then be searched and enriched with additional context. Contextualising the content for consumers completes the 360 degrees view of the metadata. Once this view exists, an organization can then decide how best to address data anomalies, integration, synchronisation.
 
Dresner’s report reminds us that the “top priority” ADI use cases are: 
 
1. “reporting and dashboards” and, 
2 “discovery and exploration.” Done right, the cloud enables the data-driven decision making. And, therefore, successful mastery of data, governance, in the cloud necessitates some form of enterprise data catalog. 
 
How else can decision-makers trust cloud ADI if they don’t know where the data comes from, what rules were applied, what’s the data quality, who’s accountable for data integrity, and so on? 
 
Data is new economic fuel, and the data catalog is the new jet propulsion engine. Savvy executives, who recognise today’s data-first, cloud-driven world, know that good ADI = better business. 
 
Information-Management:                Image: Nick Youngson
 
You Might Also Read: 

Have You Gauged The Cost Of A Cloud Outage?:
 
Five Steps To Keeping Your Cloud GDPR Compliant:
 
« What Does Blockchain Mean To The EU?
US Builds The Fastest Supercomputer. For Now. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.

SSL2BUY

SSL2BUY

SSL2BUY is a leading SSL certificate provider, authorized to sell top CA brands like Comodo, DigiCert, GlobalSign, Thawte, GeoTrust and more.