How Cloud Computing Changes Data Governance Strategies

Cloud computing is the next generation “analytic data infrastructure,” according to a study recently published by Dresden Advisory Services. 
 
Whether on-premises, private, hybrid or multi-cloud, organisations taking advantage of cloud benefits require an alternative data governance approach. 
 
Even with the promise of cloud improving data availability, Dresner’s report indicates nearly 50 percent of those surveyed have difficulty “locating and accessing data,” and in a new report on data catalogs, there is a “direct relationship” between those that have a catalog and the perceived success of “BI initiatives.” 
 
Why? Potentially Several Reasons: 
 
1. Proliferation of disparate data that may be co-located, but not necessarily integrated.
2. Plethora of technologies and APIs that provision, consume or syndicate data, including open source software, many of which have limited metadata capabilities.
3. Security monitoring to continuously assess threats and vulnerabilities.
4. Distributed protection of personal and other sensitive data.
5. Dissimilar complex supply chain workflows that could create data anomalies.
6. Third-party applications that cannot be integrated.
7. Insatiable demand for more information.
8. Burgeoning data diversification.
9. Analytic complexity.
10. More onerous regulatory, audit, and compliance requirements.
 
Cloud is a multiverse – a confederation of distributed apps. But regardless of a cloud implementation approach, while some apps may be co-located, they are not necessarily integrated. Therefore, the cloud often complicates data management by creating distributed, non-integrated data environments, which require more governance, not less.
 
If data governance is yet to be an inherent part of cloud planning, strategy, design, and implementation, then addressing challenges like those above are harder. 
 
Like with all new technologies there is an adoption, activation and adaptation cycle. Today, cloud benefits are self-evident, and the uptake will accelerate. This article isn’t about cloud virtues, but why data governance, to increase data availability and accessibility, is essential for cloud enablement. 
 
Some things don’t change, including traditional data governance concerns such as charter, scope, principles, organization, roles, responsibilities, operating model, etc. 
 
So what does change? Several things:
 
Data polices – Are they sufficient to address security, storage, syndication, regulatory, and retention requirements? If such data management policies exist, are they consistently followed across the enterprise?
Data quality – Is the data improved as result of legacy app to cloud migration? Are the business rules documented, and consistently applied? 
Data architecture – Are changes to conceptual, logical, and physical models coordinated and synchronised? 
Data security – Is the data consistently protected wherever it is stored? Does the data conform to security policies?
Data stewardship – Does all of the cloud data have a steward? That is, someone who is accountable for the integrity of the data wherever it originates, and is stored or processed? 
Data science – How are models effectively managed in the distributed environment? Are quants using the same data consistently? How can cloud improve quant productivity?
Data management and operational procedures – How will cloud impact data archiving, backup, recovery, business continuity? What is the impact on service and operating levels?
Master data and metadata management – Is the data defined well enough to be understood by all stakeholders? Does the data have consistent format, rules, etc.
DevOps – Is the development methodology, data transformation, data integration approach, operational procedures, and gate reviews sufficient to prevent data anomalies? 
Technical Architecture – Introducing and integrating cloud stack(s) with existing stack(s) also presents challenges. Not all stacks are created equal, and given the nascent nature of many of new technologies, are performance expectations adequately managed?
 
One other ADI characteristic often overlooked is financial management. For example, what are the implementation, consumption, maintenance and support costs? Would chargeback improve cost allocation? So what?
 
Dresner’s findings suggest a “strong correlation” between those organizations that have a catalog and BI success. For many organisations, with hundreds, if not thousands of disparate systems, often distributed across heterogenous platforms, knowing and keeping track of what data exists where is very difficult. 
 
Clearly, finding data, and remediating data anomalies, cannot be performed manually. Therefore, automation and orchestration are the only reasonable, practical solutions to intelligently address quality issues for “data in motion,” and catalog key “data at rest.” 
 
Without sophisticated analytics, improving data quality is daunting. 
Through the use of advanced “scanners,” organisations can automatically catalog and classify all types of data, making sense of both similar and dissimilar data, and storing this information in a central metadata repository, which can be then be searched and enriched with additional context. Contextualising the content for consumers completes the 360 degrees view of the metadata. Once this view exists, an organization can then decide how best to address data anomalies, integration, synchronisation.
 
Dresner’s report reminds us that the “top priority” ADI use cases are: 
 
1. “reporting and dashboards” and, 
2 “discovery and exploration.” Done right, the cloud enables the data-driven decision making. And, therefore, successful mastery of data, governance, in the cloud necessitates some form of enterprise data catalog. 
 
How else can decision-makers trust cloud ADI if they don’t know where the data comes from, what rules were applied, what’s the data quality, who’s accountable for data integrity, and so on? 
 
Data is new economic fuel, and the data catalog is the new jet propulsion engine. Savvy executives, who recognise today’s data-first, cloud-driven world, know that good ADI = better business. 
 
Information-Management:                Image: Nick Youngson
 
You Might Also Read: 

Have You Gauged The Cost Of A Cloud Outage?:
 
Five Steps To Keeping Your Cloud GDPR Compliant:
 
« What Does Blockchain Mean To The EU?
US Builds The Fastest Supercomputer. For Now. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.