SlideShare a Scribd company logo
July 15, 2021
Closing the Governance Gap:
Enabling Governed Self-Service Analytics
David Loshin
President, Knowledge Integrity
Program Director, Master of Information Management, University of Maryland
Sponsor
2
DAVID LOSHIN
President, Knowledge Integrity, Inc.
Program Director, Master of Information
Management, University of Maryland
Data Sensitivity
• Growing recognition of risks of exposing
individuals’ personal and private
information
– Emerging indignance over corporations using
and selling what is believed to be personal or
private information
– Increasing number and volume of data
breaches
– Expanding interest of governmental
intervention and protection
• A growing inventory of global regulations
address the need to secure and protect
individuals’ personal and private data
• Growing awareness of the general
concepts of protection of “sensitive” data
On-Premises
Multicloud
Challenges of the Evolving Data Landscape
Variance in Definitions and Semantics
“Personal information” means information that identifies, relates to,
describes, is reasonably capable of being associated with, or could
reasonably be linked, directly or indirectly, with a particular consumer
or household. Personal information includes, but is not limited to, the
following if it identifies, relates to, describes, is reasonably capable of
being associated with, or could be reasonably linked, directly or
indirectly, with a particular consumer or household
Name
Alias
Postal address
Account name
SSN
Email address
IP address
Driver’s license
Passport number
Other personal identifiers
Products or services considered
Products or services purchased
Products or services obtained
Purchasing histories
Personal property records
Consuming history
Biometric information
Geolocation information
Education information
Employment information
Interaction with an internet website
Search history
Browsing history
Electronic data
Audio data
Visual data
Thermal data
Olfactory data
"Sensitive data" means a category of personal data that includes:
1. Personal data revealing racial or ethnic origin, religious beliefs, mental or
physical health diagnosis, sexual orientation, or citizenship or immigration
status;
2. The processing of genetic or biometric data for the purpose of uniquely
identifying a natural person;
3. The personal data collected from a known child; or
4. Precise geolocation data.
"Personal data" means any information that is linked or
reasonably linkable to an identified or identifiable natural
person.
Interpreting Policies and Assessing Governance Impact
GDPR’s
Right
to
Erasure
At what point do you determine that personal data
are no longer necessary for the purposes for which
they were collected?
How does your organization
“manage consent”?
What does it mean to “erase” data?
Is the default to erase data that are no
longer necessary?
How do you keep track of the
controllers? How do you notify
them?
How do you locate all links,
copies, replications within your
own organization?
How do you convey obligations
to other controllers?
Protection of
consumer sensitive
data is mandated, yet
is excepted in certain
scenarios in which
there is lawful use of
the data!
Legal Complexities
“Policies” and Data Policies
• Laws, regulations, standards are
examples of “Policies” that direct
organizational behavior
• “Policies” impose policies on the
management and use of information via
data policies
• Data policies are defined to govern the
use of information within the context(s) of
the array of “Policies”
• Data policies must provide assurance
that data consumers are able to access
the data they need under the appropriate
circumstances and usage scenarios
Data Sensitivity Assessment & Classification
• Assessment
– Data discovery to
determine if the asset
contains potentially
sensitive data
• Classification
– Within the context of
defined policies, assign
one or more sensitivity
classifications to the data
asset by data attribute
Confidential data
Controlled unclassified data
Export-controlled data
IT security data
Government classified data
Sensitive corporate data
Chain of custody data
Personal data
Defining Data Policies
 Policy: Within the context, the actor’s privilege is limited via the constraint in accessing the asset at the level
of granularity during the duration.
 Example: Within the provider lookup process, the Fraud Analyst’s ability to view data is limited in viewing
the Provider Enrollment table records when there is an active fraud investigation for two weeks after the
investigation is launched
Actor: the user, role, and/or group that is subject to the policy
Granularity: the subset or component of the asset subject to the policy
Privilege: the permissions associated with accessing or using the asset
Constraint: the restriction imposed by the policy
Context: the circumstances under which the constraint is effective
Duration: the time frame within which the policy is in effect
Asset: the data object that requires a protection policy
You know it is true…
Translating, documenting,
defining, implementing,
ensuring compliance with,
and governing data policies
is hard.
Governance Gap
?
“Policy” owners understand how business
directives impact data policies but are
unfamiliar with the data and with the tools
to implement those policies
Data consumers are willing to abide by data
policies but are not aware of how those
policies are defined or implemented
IT developers manage data policy tools but
are unaware of data sensitivity and how
business directives are translated into data
policies
Due to the disparity between how policy owners interpret data policies and how they are actually implemented, no
single persona has the policy knowledge, technical expertise, and data awareness to deploy data policies
Closing the Governance Gap
• Employ tools that provide a
simplified mechanism for
granting privileges to data
consumers for controlled
access to the data they need
• Institute processes and
practices for defining data
policies using a defined
taxonomic categorization
• Map categories to data
domains and consumer
personas
• Use a semantic view to
logically express data
policies in a manageable
and scalable way
Semantic Approaches for Self-Service Governed Access
Data Owners
Data to be shared
Classifications
PHI
PII
FINANCIAL_DATA
…
Roles
Claims_Processor
Fraud_Analyst
Finance_Analyst
…
Assess sensitivity
Define classifications
Specify roles
Determine privileges
Define conceptual data
policies
Conceptual Policies
Claims_Processor may access FINANCIAL_DATA
Fraud_Analyst may access PII
…
Translate conceptual data
policies to target systems
1
2
3
Automate Policy Compliance and Auditing
Data
Consumer
Data
Consumer
Data
Consumer
Data
Consumer
Centralized
Policy
Portal
Enterprise Identity
Access Management
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Policy
Proxy
Row-level & column-level data protection
Considerations: Governed Self-Service Access
• Centralized data governance team composed of data
policy drivers, data owners, data consumers, and
technicians
• Logical frameworks for policy specification
• Enforcement is delegated to business unit
• Data policy stewards
– Support the definition and translation of data policies
– Monitor policy compliance through tool interface
– Enforce policies according to line of business requirements
• Data owners
– Classify data according to categories of sensitivity
– Enable access for data sharing
– Register data assets in a data catalog
• Data consumers
– Browse data catalog
– Request access
– Access is automatically configured
• Data policy definition can be
automated using tools
• Data assets can be securely
shared
• Automated monitoring provides
an audit for compliance
• Data consumers are confident in
trustworthiness of the data
RAJIV DHOLAKIA
SVP Products
Privacera
Governed Self-Service
Analytics- A New Paradigm
Rajiv Dholakia, SVP Products
Date: July 2021
Enabling responsible use of data
Powered by Apache Ranger
Complying With Privacy Regulations Has Slowed
Down Cloud Migration And Analytics Initiatives
Do we have
any PII data in
the cloud?
How to enable
fine-grained
access control?
How to comply
with new regulations?
%
70%
said cloud migration
and analytics have
been made more
complex due to
compliance with
privacy regulations
* Survey conducted by 3rd party agency
in
100 interviews with execs from Fortune
500 companies
Balancing the Dual Mandate of Regulation
Compliance
and Data Sharing Presents More Challenges for IT
%
58%
report conflict
between data
scientists and data
security & compliance
teams due to access
restrictions
* Survey conducted by 3rd party agency
in
100 interviews with execs from Fortune
500 companies
BY 2025, EVERY BUSINESS IS GOING TO BE A
DATA DRIVEN BUSINESS
(OR START TO GO OUT OF BUSINESS)
WHAT IS HARD ABOUT A DATA DRIVEN BUSINESS?
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA ACCESS GOVERNANCE CONTROL PLANE
IDENTITY & SECURITY
CONTROL PLANE
BUSINESS GOVERNANCE
CONTROL PLANE
ACCESS GOVERNANCE PLATFORM
DATA SOURCES & STORAGE COMPUTE CONSUME
DATA GOVERNANCE CONTROL PLANE
IDENTITY & SECURITY
CONTROL PLANE
BUSINESS GOVERNANCE
CONTROL PLANE
UNIVERSAL DATA ACCESS GOVERNANCE
PLATFORM
DISCOVER
ACCESS
POLICY
ENCRYPT
& SECURE
AUDIT
& REPORT
The Future of Governance
2024-2026
ACCESS
POLICY CREATION &
AUTOMATION
(Policy Sync & Governing
Data Sets)
2021-2023
2018-2020
ACCESS
POLICY
ENFORCEMEN
T
(Plugins & Policy in
Code, Ease of
Creation)
ASSISTED AUTOMATED INTELLIGENT
INTELLIGENT
DATA
GOVERNANCE
PLATFORM
A Peek at the Future…
Enabling responsible use of data
Powered by Apache Ranger
Teams/Roles
Check and Balances
Data Sets
Requirement
Configure
Data
Users
Access Data
Privacy and
Compliance Team
Requirement
Monitor
Governance
Team
Governance
Team
Requirement Security
Team
Configure
Data
Stewards
Data Sharing and Usage: Rethinking the Process
Data
Sources
Data
Assets
IT
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Data Sharing and Usage: Putting it in Action
Data
Sources
Data
Assets
Data
Sharing
IT Owner
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Sales Team
Support Team
Marketing Team
HR Team
Finance Team
Data Sharing and Usage: Governed Data Sharing
Data
Sources
Data
Assets
Data
Sharing
Projects
IT Owner Lead
Sales Data
Customers Data
Marketing Data
HR Data
Finance Data
Sales Team
Support Team
Marketing Team
HR Team
Finance Team
BI - Usage
Dashboards
(Customer Data)
Data Science –
Email
Campaigns
(Sales + Customer Data)
BI - Revenue
Projections
(Sales + Customer +
Finance Data)
Attributes of Governed Self-Service Analytics
Platform
•Centralized Visibility - Get visibility into all user activity and
proactively address any compliance violations
•Delegated Policy Administration - Central and local teams should
be able to build policies, not just with a better UI but in an automated
way
•Native Enforcement - Enforcement of policies should be done
closer to data and natively within the application
Visualize
Data
Governance
Let's stay in touch.
FOLLOW US ONLINE
@privacera
linkedin.com/company/privacera
Thank you!
EMAIL
rajiv.dholakia@privacera.com
VISIT OUR WEBSITE
http://www.privacera.com/solutions/governed-data-
sharing
Questions and Answers
David Loshin
President, Knowledge Integrity, Inc
loshin@knowledge-integrity.com
Rajiv Dholakia
SVP Products, Privacera
rajiv.dholakia@privacera.com, @dholakia
Thanks to Our Sponsor
36

More Related Content

PPT
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Laura Edell
 
PDF
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Srikanth Sharma Boddupalli
 
PDF
Building Rules for Data Governance
Precisely
 
PDF
Complying with Cybersecurity Regulations for IBM i Servers and Data
Precisely
 
PDF
Data Quality Strategy: A Step-by-Step Approach
FindWhitePapers
 
PPTX
Competing IT Priorities - An Operating Model for Data Stewardship and Busines...
Jaleann M McClurg MPH, CSPO, CSM, DTM
 
PPT
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
Pieter De Leenheer
 
PDF
Top 3 Hot Data Security And Privacy Technologies
Tyrone Systems
 
Social Intelligence by Bill Baker, CTO, Visible Technologies (former GM of Mi...
Laura Edell
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Srikanth Sharma Boddupalli
 
Building Rules for Data Governance
Precisely
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Precisely
 
Data Quality Strategy: A Step-by-Step Approach
FindWhitePapers
 
Competing IT Priorities - An Operating Model for Data Stewardship and Busines...
Jaleann M McClurg MPH, CSPO, CSM, DTM
 
MIT ICIQ 2017 Keynote: Data Governance and Data Capitalization in the Big Dat...
Pieter De Leenheer
 
Top 3 Hot Data Security And Privacy Technologies
Tyrone Systems
 

What's hot (20)

PDF
Applying Data Quality Best Practices at Big Data Scale
Precisely
 
PPTX
Business Semantics for Data Governance and Stewardship
Pieter De Leenheer
 
PPT
Data Governance in a big data era
Pieter De Leenheer
 
PDF
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
Denodo
 
PDF
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
Pieter De Leenheer
 
PDF
Slides: Data Governance Reality Check
DATAVERSITY
 
PDF
Enacting the data subjects access rights for gdpr with data services and data...
Jean-Michel Franco
 
PDF
The Merger is Happening, Now What Do We Do?
DATUM LLC
 
PDF
Change management success for data governance
Reid Elliott
 
PPTX
2. Getvisibility. Innovative data governance, control & oversight
Vanessa Pulgarín Auquilla
 
PPT
Data Quality
Michael Collins
 
PPTX
Enterprise Analytics: Serving Big Data Projects for Healthcare
DATA360US
 
PDF
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
DATAVERSITY
 
PDF
Data Catalog as the Platform for Data Intelligence
Alation
 
PDF
Revolution In Data Governance - Transforming the customer experience
Paul Dyksterhouse
 
PDF
Enterprise Data World Webinar: A Strategic Approach to Data Quality
DATAVERSITY
 
PDF
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
DATAVERSITY
 
PDF
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
DATAVERSITY
 
PDF
Data Profiling: The First Step to Big Data Quality
Precisely
 
PPTX
Data Strategy Flywheel
Alexander Mann
 
Applying Data Quality Best Practices at Big Data Scale
Precisely
 
Business Semantics for Data Governance and Stewardship
Pieter De Leenheer
 
Data Governance in a big data era
Pieter De Leenheer
 
TDWI Spotlight: Enabling Data Self-Service with Security, Governance, and Reg...
Denodo
 
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
Pieter De Leenheer
 
Slides: Data Governance Reality Check
DATAVERSITY
 
Enacting the data subjects access rights for gdpr with data services and data...
Jean-Michel Franco
 
The Merger is Happening, Now What Do We Do?
DATUM LLC
 
Change management success for data governance
Reid Elliott
 
2. Getvisibility. Innovative data governance, control & oversight
Vanessa Pulgarín Auquilla
 
Data Quality
Michael Collins
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
DATA360US
 
Slides: Applying Artificial Intelligence (AI) in All the Right Places in the ...
DATAVERSITY
 
Data Catalog as the Platform for Data Intelligence
Alation
 
Revolution In Data Governance - Transforming the customer experience
Paul Dyksterhouse
 
Enterprise Data World Webinar: A Strategic Approach to Data Quality
DATAVERSITY
 
Enterprise Data World Webinar: Mastering & Referencing Data for the Enterprise
DATAVERSITY
 
Subscribing to Your Critical Data Supply Chain - Getting Value from True Data...
DATAVERSITY
 
Data Profiling: The First Step to Big Data Quality
Precisely
 
Data Strategy Flywheel
Alexander Mann
 
Ad

Similar to Closing the Governance Gap - Enabling Governed Self-Service Analytics (20)

PDF
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
PDF
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
PDF
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
PDF
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
PDF
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
Uncodemy
 
PDF
How to Strengthen Enterprise Data Governance with Data Quality
Precisely
 
PDF
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
PDF
The value of big data analytics
Marc Vael
 
PDF
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Soumodeep Nanee Kundu
 
PDF
Maturing Your Organization's Information Risk Management Strategy
Privacera
 
PDF
BRG_TAP_IG_20150826_WEB
Margaret (Peggy) Daley
 
PPTX
Ethics in Data Management.pptx
Ravindra Babu
 
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
PPTX
Lesson 9- Data Governance and Ethics.pptx
1045858
 
DOCX
What is data governance and why is it important
yogi A
 
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
PPT
Information Risk Management Overview
elvinchan
 
PDF
Data Privacy in the Work From Home Era
Neo4j
 
PPTX
Data set Legislation
Data-Set
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
Uncodemy
 
How to Strengthen Enterprise Data Governance with Data Quality
Precisely
 
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
The value of big data analytics
Marc Vael
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Soumodeep Nanee Kundu
 
Maturing Your Organization's Information Risk Management Strategy
Privacera
 
BRG_TAP_IG_20150826_WEB
Margaret (Peggy) Daley
 
Ethics in Data Management.pptx
Ravindra Babu
 
Keep Calm and Comply: 3 Keys to GDPR Success
Sirius
 
Lesson 9- Data Governance and Ethics.pptx
1045858
 
What is data governance and why is it important
yogi A
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
Information Risk Management Overview
elvinchan
 
Data Privacy in the Work From Home Era
Neo4j
 
Data set Legislation
Data-Set
 
Ad

More from Privacera (9)

PDF
Five Elements of Effective Data Access Governance
Privacera
 
PDF
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
Privacera
 
PDF
Data & the Machine Sofa Summit
Privacera
 
PDF
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera
 
PDF
Why enterprise data privacy and security matters more than ever before
Privacera
 
PDF
History of Privacera
Privacera
 
PDF
How to streamline data governance and security across on-prem and cloud?
Privacera
 
PDF
Privacera Databricks CCPA Webinar Feb 2020
Privacera
 
PDF
Privacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera
 
Five Elements of Effective Data Access Governance
Privacera
 
Fortifying Data Access and Security Controls to Accelerate Cloud Migration
Privacera
 
Data & the Machine Sofa Summit
Privacera
 
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera
 
Why enterprise data privacy and security matters more than ever before
Privacera
 
History of Privacera
Privacera
 
How to streamline data governance and security across on-prem and cloud?
Privacera
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera
 
Privacera Product Overview: Secure Data Sharing Across Cloud Services
Privacera
 

Recently uploaded (20)

PDF
SUMMER INTERNSHIP REPORT[1] (AutoRecovered) (6) (1).pdf
pandeydiksha814
 
PPTX
Future_of_AI_Presentation for everyone.pptx
boranamanju07
 
PDF
TIC ACTIVIDAD 1geeeeeeeeeeeeeeeeeeeeeeeeeeeeeer3.pdf
Thais Ruiz
 
PPTX
Web dev -ppt that helps us understand web technology
shubhragoyal12
 
PDF
Practical Measurement Systems Analysis (Gage R&R) for design
Rob Schubert
 
PDF
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
PPTX
MR and reffffffvvvvvvvfversal_083605.pptx
manjeshjain
 
PDF
717629748-Databricks-Certified-Data-Engineer-Professional-Dumps-by-Ball-21-03...
pedelli41
 
PPTX
IP_Journal_Articles_2025IP_Journal_Articles_2025
mishell212144
 
PPTX
Fuzzy_Membership_Functions_Presentation.pptx
pythoncrazy2024
 
PPTX
Fluvial_Civilizations_Presentation (1).pptx
alisslovemendoza7
 
PPTX
Introduction to Data Analytics and Data Science
KavithaCIT
 
PPTX
HSE WEEKLY REPORT for dummies and lazzzzy.pptx
ahmedibrahim691723
 
PDF
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
PPTX
The whitetiger novel review for collegeassignment.pptx
DhruvPatel754154
 
PPTX
Probability systematic sampling methods.pptx
PrakashRajput19
 
PDF
Blitz Campinas - Dia 24 de maio - Piettro.pdf
fabigreek
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PDF
Mastering Financial Analysis Materials.pdf
SalamiAbdullahi
 
PPTX
Pipeline Automatic Leak Detection for Water Distribution Systems
Sione Palu
 
SUMMER INTERNSHIP REPORT[1] (AutoRecovered) (6) (1).pdf
pandeydiksha814
 
Future_of_AI_Presentation for everyone.pptx
boranamanju07
 
TIC ACTIVIDAD 1geeeeeeeeeeeeeeeeeeeeeeeeeeeeeer3.pdf
Thais Ruiz
 
Web dev -ppt that helps us understand web technology
shubhragoyal12
 
Practical Measurement Systems Analysis (Gage R&R) for design
Rob Schubert
 
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
MR and reffffffvvvvvvvfversal_083605.pptx
manjeshjain
 
717629748-Databricks-Certified-Data-Engineer-Professional-Dumps-by-Ball-21-03...
pedelli41
 
IP_Journal_Articles_2025IP_Journal_Articles_2025
mishell212144
 
Fuzzy_Membership_Functions_Presentation.pptx
pythoncrazy2024
 
Fluvial_Civilizations_Presentation (1).pptx
alisslovemendoza7
 
Introduction to Data Analytics and Data Science
KavithaCIT
 
HSE WEEKLY REPORT for dummies and lazzzzy.pptx
ahmedibrahim691723
 
202501214233242351219 QASS Session 2.pdf
lauramejiamillan
 
The whitetiger novel review for collegeassignment.pptx
DhruvPatel754154
 
Probability systematic sampling methods.pptx
PrakashRajput19
 
Blitz Campinas - Dia 24 de maio - Piettro.pdf
fabigreek
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
Mastering Financial Analysis Materials.pdf
SalamiAbdullahi
 
Pipeline Automatic Leak Detection for Water Distribution Systems
Sione Palu
 

Closing the Governance Gap - Enabling Governed Self-Service Analytics

  • 1. July 15, 2021 Closing the Governance Gap: Enabling Governed Self-Service Analytics David Loshin President, Knowledge Integrity Program Director, Master of Information Management, University of Maryland
  • 3. DAVID LOSHIN President, Knowledge Integrity, Inc. Program Director, Master of Information Management, University of Maryland
  • 4. Data Sensitivity • Growing recognition of risks of exposing individuals’ personal and private information – Emerging indignance over corporations using and selling what is believed to be personal or private information – Increasing number and volume of data breaches – Expanding interest of governmental intervention and protection • A growing inventory of global regulations address the need to secure and protect individuals’ personal and private data • Growing awareness of the general concepts of protection of “sensitive” data
  • 6. Variance in Definitions and Semantics “Personal information” means information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household. Personal information includes, but is not limited to, the following if it identifies, relates to, describes, is reasonably capable of being associated with, or could be reasonably linked, directly or indirectly, with a particular consumer or household Name Alias Postal address Account name SSN Email address IP address Driver’s license Passport number Other personal identifiers Products or services considered Products or services purchased Products or services obtained Purchasing histories Personal property records Consuming history Biometric information Geolocation information Education information Employment information Interaction with an internet website Search history Browsing history Electronic data Audio data Visual data Thermal data Olfactory data "Sensitive data" means a category of personal data that includes: 1. Personal data revealing racial or ethnic origin, religious beliefs, mental or physical health diagnosis, sexual orientation, or citizenship or immigration status; 2. The processing of genetic or biometric data for the purpose of uniquely identifying a natural person; 3. The personal data collected from a known child; or 4. Precise geolocation data. "Personal data" means any information that is linked or reasonably linkable to an identified or identifiable natural person.
  • 7. Interpreting Policies and Assessing Governance Impact GDPR’s Right to Erasure At what point do you determine that personal data are no longer necessary for the purposes for which they were collected? How does your organization “manage consent”? What does it mean to “erase” data? Is the default to erase data that are no longer necessary? How do you keep track of the controllers? How do you notify them? How do you locate all links, copies, replications within your own organization? How do you convey obligations to other controllers?
  • 8. Protection of consumer sensitive data is mandated, yet is excepted in certain scenarios in which there is lawful use of the data! Legal Complexities
  • 9. “Policies” and Data Policies • Laws, regulations, standards are examples of “Policies” that direct organizational behavior • “Policies” impose policies on the management and use of information via data policies • Data policies are defined to govern the use of information within the context(s) of the array of “Policies” • Data policies must provide assurance that data consumers are able to access the data they need under the appropriate circumstances and usage scenarios
  • 10. Data Sensitivity Assessment & Classification • Assessment – Data discovery to determine if the asset contains potentially sensitive data • Classification – Within the context of defined policies, assign one or more sensitivity classifications to the data asset by data attribute Confidential data Controlled unclassified data Export-controlled data IT security data Government classified data Sensitive corporate data Chain of custody data Personal data
  • 11. Defining Data Policies  Policy: Within the context, the actor’s privilege is limited via the constraint in accessing the asset at the level of granularity during the duration.  Example: Within the provider lookup process, the Fraud Analyst’s ability to view data is limited in viewing the Provider Enrollment table records when there is an active fraud investigation for two weeks after the investigation is launched Actor: the user, role, and/or group that is subject to the policy Granularity: the subset or component of the asset subject to the policy Privilege: the permissions associated with accessing or using the asset Constraint: the restriction imposed by the policy Context: the circumstances under which the constraint is effective Duration: the time frame within which the policy is in effect Asset: the data object that requires a protection policy
  • 12. You know it is true… Translating, documenting, defining, implementing, ensuring compliance with, and governing data policies is hard.
  • 13. Governance Gap ? “Policy” owners understand how business directives impact data policies but are unfamiliar with the data and with the tools to implement those policies Data consumers are willing to abide by data policies but are not aware of how those policies are defined or implemented IT developers manage data policy tools but are unaware of data sensitivity and how business directives are translated into data policies Due to the disparity between how policy owners interpret data policies and how they are actually implemented, no single persona has the policy knowledge, technical expertise, and data awareness to deploy data policies
  • 14. Closing the Governance Gap • Employ tools that provide a simplified mechanism for granting privileges to data consumers for controlled access to the data they need • Institute processes and practices for defining data policies using a defined taxonomic categorization • Map categories to data domains and consumer personas • Use a semantic view to logically express data policies in a manageable and scalable way
  • 15. Semantic Approaches for Self-Service Governed Access Data Owners Data to be shared Classifications PHI PII FINANCIAL_DATA … Roles Claims_Processor Fraud_Analyst Finance_Analyst … Assess sensitivity Define classifications Specify roles Determine privileges Define conceptual data policies Conceptual Policies Claims_Processor may access FINANCIAL_DATA Fraud_Analyst may access PII … Translate conceptual data policies to target systems 1 2 3
  • 16. Automate Policy Compliance and Auditing Data Consumer Data Consumer Data Consumer Data Consumer Centralized Policy Portal Enterprise Identity Access Management Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Policy Proxy Row-level & column-level data protection
  • 17. Considerations: Governed Self-Service Access • Centralized data governance team composed of data policy drivers, data owners, data consumers, and technicians • Logical frameworks for policy specification • Enforcement is delegated to business unit • Data policy stewards – Support the definition and translation of data policies – Monitor policy compliance through tool interface – Enforce policies according to line of business requirements • Data owners – Classify data according to categories of sensitivity – Enable access for data sharing – Register data assets in a data catalog • Data consumers – Browse data catalog – Request access – Access is automatically configured • Data policy definition can be automated using tools • Data assets can be securely shared • Automated monitoring provides an audit for compliance • Data consumers are confident in trustworthiness of the data
  • 19. Governed Self-Service Analytics- A New Paradigm Rajiv Dholakia, SVP Products Date: July 2021 Enabling responsible use of data Powered by Apache Ranger
  • 20. Complying With Privacy Regulations Has Slowed Down Cloud Migration And Analytics Initiatives Do we have any PII data in the cloud? How to enable fine-grained access control? How to comply with new regulations? % 70% said cloud migration and analytics have been made more complex due to compliance with privacy regulations * Survey conducted by 3rd party agency in 100 interviews with execs from Fortune 500 companies
  • 21. Balancing the Dual Mandate of Regulation Compliance and Data Sharing Presents More Challenges for IT % 58% report conflict between data scientists and data security & compliance teams due to access restrictions * Survey conducted by 3rd party agency in 100 interviews with execs from Fortune 500 companies
  • 22. BY 2025, EVERY BUSINESS IS GOING TO BE A DATA DRIVEN BUSINESS (OR START TO GO OUT OF BUSINESS)
  • 23. WHAT IS HARD ABOUT A DATA DRIVEN BUSINESS? DATA SOURCES & STORAGE COMPUTE CONSUME
  • 24. DATA SOURCES & STORAGE COMPUTE CONSUME DATA ACCESS GOVERNANCE CONTROL PLANE IDENTITY & SECURITY CONTROL PLANE BUSINESS GOVERNANCE CONTROL PLANE ACCESS GOVERNANCE PLATFORM
  • 25. DATA SOURCES & STORAGE COMPUTE CONSUME DATA GOVERNANCE CONTROL PLANE IDENTITY & SECURITY CONTROL PLANE BUSINESS GOVERNANCE CONTROL PLANE UNIVERSAL DATA ACCESS GOVERNANCE PLATFORM DISCOVER ACCESS POLICY ENCRYPT & SECURE AUDIT & REPORT
  • 26. The Future of Governance 2024-2026 ACCESS POLICY CREATION & AUTOMATION (Policy Sync & Governing Data Sets) 2021-2023 2018-2020 ACCESS POLICY ENFORCEMEN T (Plugins & Policy in Code, Ease of Creation) ASSISTED AUTOMATED INTELLIGENT INTELLIGENT DATA GOVERNANCE PLATFORM
  • 27. A Peek at the Future… Enabling responsible use of data Powered by Apache Ranger
  • 28. Teams/Roles Check and Balances Data Sets Requirement Configure Data Users Access Data Privacy and Compliance Team Requirement Monitor Governance Team Governance Team Requirement Security Team Configure Data Stewards
  • 29. Data Sharing and Usage: Rethinking the Process Data Sources Data Assets IT Sales Data Customers Data Marketing Data HR Data Finance Data
  • 30. Data Sharing and Usage: Putting it in Action Data Sources Data Assets Data Sharing IT Owner Sales Data Customers Data Marketing Data HR Data Finance Data Sales Team Support Team Marketing Team HR Team Finance Team
  • 31. Data Sharing and Usage: Governed Data Sharing Data Sources Data Assets Data Sharing Projects IT Owner Lead Sales Data Customers Data Marketing Data HR Data Finance Data Sales Team Support Team Marketing Team HR Team Finance Team BI - Usage Dashboards (Customer Data) Data Science – Email Campaigns (Sales + Customer Data) BI - Revenue Projections (Sales + Customer + Finance Data)
  • 32. Attributes of Governed Self-Service Analytics Platform •Centralized Visibility - Get visibility into all user activity and proactively address any compliance violations •Delegated Policy Administration - Central and local teams should be able to build policies, not just with a better UI but in an automated way •Native Enforcement - Enforcement of policies should be done closer to data and natively within the application
  • 34. Let's stay in touch. FOLLOW US ONLINE @privacera linkedin.com/company/privacera Thank you! EMAIL [email protected] VISIT OUR WEBSITE http://www.privacera.com/solutions/governed-data- sharing
  • 35. Questions and Answers David Loshin President, Knowledge Integrity, Inc [email protected] Rajiv Dholakia SVP Products, Privacera [email protected], @dholakia
  • 36. Thanks to Our Sponsor 36