DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Related

  • What Is API-First?
  • Are Your Password Management Practices up to Par?
  • Types of Data Breaches in Today’s World
  • Cloud Computing Security: Ensuring Data Protection in the Digital Age

Trending

  • Scaling Java Microservices to Extreme Performance Using NCache
  • Long Tests: Saving All App’s Debug Logs and Writing Your Own Logs
  • AI and Rules for Agile Microservices in Minutes
  • Harmonizing AI: Crafting Personalized Song Suggestions
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Data Governance – Data Privacy and Security – Part 1

Data Governance – Data Privacy and Security – Part 1

Data Governance helps organizations manage their data effectively, ensuring quality and security for better decision-making.

By 
Sukanya Konatam user avatar
Sukanya Konatam
·
Jun. 20, 23 · Analysis
Like (2)
Save
Tweet
Share
3.7K Views

Join the DZone community and get the full member experience.

Join For Free

In every organization, there may be multiple source systems for various needs. Depending on how big the organization is, the source systems may vary from one to more than 1,000. Organizations often centralize their data in one place, integrate it, and derive value out of the data, such as a 360-degree view of customers, products, and so forth. To achieve this, a good data governance framework needs to be in place. 

The Data Governance framework helps organizations to group the data in the appropriate way, manage the data, ensure the quality of the data, verify the consistency of data, and completeness of data, all to improve decision-making abilities and secure the data in an apt way.

The key pillars of Data Governance are described below. Data privacy and security are the two critical pillars for any product to be sustainable and successful.


The key pillars of Data Governance


Data Privacy and Security

Data Privacy and Security could be implemented at the level of each individual system. However, when integrating data from different systems, a proper security framework must be implemented. Otherwise, the data may fall into a data privacy and security breach, which may cause a detrimental impact on the organizations. Here is the pictorial representation of data privacy and security.

Here is the pictorial representation of data privacy and security.


In the above picture, the individual systems, such as financials, HR, Marketing, and Operations, are secured individually. When the system is integrated into a centralized Datawarehouse location, there = challenges with security will arise.

Solution Approaches 

To overcome those challenges with security in individual systems, there are predominately two ways: Authentication (Auth) and Authorization (AuthZ). 

1. Authentication

Authentication is the process of verifying the identity of a user or process to get into the application or database, or any system. 


Authentication


In database authentication modes, there are multiple ways to achieve it, but the prominent ones are:

  • Password authentication (Example: SQL Server Authentication, Snowflake Database authentication)
  • Windows Integrated Authentication
  • Active Directory (LDAP)
  • SSO (Single Sign On authentication)
  • Key pair authentication
  • Certificate-based
  • MFA

2. Authorization

Authorization is the process where the authenticated user is allowed to access the different objects, their data, and the different operations a user can perform; for example, the user is allowed to read only some set of records or some set of attributes only, and the user can only perform update or delete operation on some set of data.

Authorization

There are several types of data authorization methods. The six prominent ones are Role Based Authorization and User-based Authorization. Depending upon the application’s security complexity, other methods also can be implemented, such as Attribute-Based Authorization, Attribute Based Access Control, Context-Based Authorization, and Rule-based Authorization.

Below, I will briefly describe Role-Based Authorization and User-based Authorization. 

Role-Based Authorization: In this type of Authorization, the objects and the data security are assigned to the roles, and the users are then assigned to roles.

Role-Based Authorization


User-Based Authorization: In this type of Authorisation, the objects and the data security will be assigned to individual users, and the users are given grants to the database objects and the data.

User-Based Authorization

Conclusion

The key takeaways from this article are:

  • A robust data governance framework is needed when we integrate data from various source systems.
  • Within data governance, data privacy and security are vital components to account for.
  • Data privacy and security can be implemented at an individual system level; however, when we bring all the source system data into a centralized location causes, security and data breach concerns arise.
  • Authentication and Authorization are two main ways to strengthen the data governance framework.
Data governance Data security authentication Data (computing) security Integration

Opinions expressed by DZone contributors are their own.

Related

  • What Is API-First?
  • Are Your Password Management Practices up to Par?
  • Types of Data Breaches in Today’s World
  • Cloud Computing Security: Ensuring Data Protection in the Digital Age

Partner Resources


Comments

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: