What does RBAC stand for in data roles?
Role-Based Access Control
RBAC is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise.
Who typically oversees data in a specific zone or admin domain?
Data Owner
A Data Owner is responsible for ensuring that information is properly maintained across platforms and business processes.
What are the primary activities of a Data Owner?
These activities ensure the proper management and governance of data assets.
What is the role of Data Custodians?
Controller of the data
Data Custodians develop and maintain technical and security controls for data collections.
What do Data Stewards focus on?
Managing quality of the data sets
Data Stewards are customer-focused and serve as Subject Matter Experts (SMEs) regarding the importance of information.
Fill in the blank: Data users and processors perform ______ as part of their job roles.
raw data input and batch jobs
What is involved in the Collection Phase of data management?
This phase includes legal and accurate data collection.
What defines the Location Phase in data management?
Storage of data in object/volume, file, and/or object storage
This phase is optional but critical for visibility into data locations.
What is the GDPR concept related to data maintenance?
Data minimization
Data minimization ensures only necessary data is maintained.
What are the methods included in data maintenance?
These methods help in managing the utility and quality of data.
What does data retention refer to?
Long-term archiving of data
Data retention is guided by best practices, policies, and regulations.
What is data remanence?
Remnants or artifacts of data that could be recovered after deletion
Data remanence poses risks of unauthorized access to sensitive information.
What is the End of Life (EOL) in the context of data?
When the utility of data expires and it is discarded or destroyed
EOL signifies that the data is no longer useful to the organization.
What does physical security in data destruction involve?
Disposition or destruction of physical media
This is crucial for ensuring confidentiality.
What are the three options for destroying data?
These methods ensure that data cannot be recovered after deletion.
What is data scoping?
Deciding the boundaries within which certain data or controls apply
This process helps in defining the limits of data governance.
What does data tailoring involve?
Customizing security controls to match organizational requirements
Data tailoring ensures that security measures fit the specific needs of the organization.
What are the 6 Phases of the Data Life Cycle?
What is Data at Rest?
Data stored on any medium (disk, database, file, cloud storage) that is not actively moving.
Security considerations include encryption at rest (AES, disk encryption), access control (RBAC, DAC, MAC), physical security, and backup and redundancy.
What is Data in Transit (Data in Motion)?
Data being transmitted across networks or between systems.
Security considerations include encryption in transit (TLS/SSL, VPN), integrity checks (hashes, digital signatures), secure communication protocols, and network monitoring / IDS.
What is Data in Use?
Data currently being processed in memory (RAM, CPU cache) or actively accessed by applications.
Security considerations include memory protection / encryption, secure application controls, endpoint security, and minimizing exposure to unauthorized access.
What is Digital Rights Management (DRM)?
DRM is access-control technology that protects licensed and copyrighted digital intellectual property or IP.
Who uses DRM?
DRM is used by publishers, manufacturers, content producers, and owners of intellectual property for digital content and device monitoring.
What types of media does DRM protect?
DRM protects copyrighted digital music files, apps, software programs, films, documentaries, TV shows, games, and other media such as sporting events.