Data Governance Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/51

flashcard set

Earn XP

Description and Tags

Flashcards for review of the Data Governance lecture notes.

Arabic

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

52 Terms

1
New cards

What is the scope and initiation phase of deploying data governance?

Defining exactly “what” is governed. Determining if any business areas are exempt due to regulatory reasons or if DG would not be helpful due to its business model. Deciding to what levels of the organization new policies will extend.

2
New cards
3
New cards

What is the assess phase of deploying data governance?

Focused on the ability of the organization to govern and to be governed. Determine the current state of the mechanisms and processes an organization will be changing as data governance rolls out.

4
New cards

What is Information Maturity Assessment?

Determines an organisation's current state of maturity to utilize data and information in an advanced manner. Understand what the organization does with the content and information it produces.

5
New cards

What is Change Capacity Assessment?

Understand the organization’s ability to adapt to new/changing policies regarding the management of information assets, and provide an overview of where the DG program will run into resistance.

6
New cards

What is Collaborative Readiness Assessment?

Reviews the ability of the organization to operate in a cross-functional manner under a formal program of collaborative processes. The assessment will develop baseline knowledge of collaborative skills and abilities.

7
New cards

What is the goal of the vision stage in deploying data governance?

To achieve an understanding of what the data governance program might look like and where the critical touch points for DG might appear.

8
New cards

What happens during the Align and Business Value step in depoloying data governance?

The DG team will examine the business strategy and goals, and develop a link between DG and improving the organization in a financially recognizable way.

9
New cards

What is the Functional Design phase of deploying data governance?

The phase where the DG program actually starts to be specified and further details are developed as to how it will actually work.

10
New cards

What occurs during the Governing Framework Design phase of deploying data governance?

Determine core information principles, baseline DG processes to support business, identify/refine IM functions and processes, and identify preliminary accountability and ownership model.

11
New cards

What is the Road Map phase of deploying data governance?

The step where DG plans the details around the “go live” events of DG. The team will define the events that take the organization from a non-governed to a governed state for its data assets.

12
New cards

What is the Rollout and Sustain phase of deploying data governance?

The DG team works to ensure the DG program remains effective and meets or exceeds expectations. Publishing many of the artefacts that have been developed and stewards/owners start reviews and audits.

13
New cards

What are Regulations?

Policies that must be adhered to in order to play within the business environment the organization operates in.

14
New cards

What is the importance of regulatory compliance in business operations?

Ensures legal and ethical handling of data , avoiding penalties and maintaining trust.

15
New cards

What specifics do regulations usually refer to?

Fine-grained access control, data retention and data deletion, audit logging and sensitive data classes.

16
New cards

What is fine-grained access control?

Precise control over who accesses what data. Making sure you provide the minimal size of the container of the data (table, dataset, etc.) that includes the requested information, providing the right level of access and establishing how long an access should remain open.

17
New cards

What are the requirements for data retention?

A requirement to preserve data for a set period to allow financial fraud investigators to backtrack.

18
New cards

What is the purpose of audit logs in regulatory compliance?

Providing evidence of policy adherence.

19
New cards

What is sensitive data?

Categories requiring special treatment due to regulations, such as personally identifiable data about EU residents, financial transaction history.

20
New cards

What is data exfiltration?

Unauthorized or accidental transfer of sensitive data to untrusted third parties or insecure systems.

21
New cards

What are the methods of data exfiltration?

Malicious actors exploiting compromised accounts or Employees misusing access permissions.

22
New cards

How can data exfiltration be mitigated for Emails and Mobile Devices?

Limit transmission volume, audit metadata, scan content, and flag insecure attempts.

23
New cards

How can data exfiltration be mitigated for Downloading to Unsecure Devices?

Prohibit downloads, enforce access logs, and use dynamic watermarks.

24
New cards

How can data exfiltration be mitigated for Exploiting Virtual Machines (VMs)?

Restrict permissions, separate test/production datasets, and scan outbound data.

25
New cards

How can data exfiltration be mitigated for Employee Termination?

Integrate HR systems with security monitoring and set stricter thresholds for flagging unusual activities.

26
New cards

What are Virtual Private Cloud Service Controls (VPC-SC)?

Protects cloud-native data lakes and warehouses by creating secure perimeters and Ensures data access is limited to authorized VPCs and IPs.

27
New cards

What is the Zero-Trust Model?

Assumes internal networks are untrustworthy, relies on device and user credentials rather than IP-based access and Implements fine-grained, encrypted access with endpoint verification.

28
New cards

What does Authentication do?

Verifies the identity of users or systems accessing resources.

29
New cards

What are Authentication Credentials?

API (Application Programming Interface) Keys, Access Tokens (OAuth 2.0 client credentials) and Service Account Keys.

30
New cards

What does Authorization do?

Determines what actions authenticated users or systems are allowed to perform based on their identity and role.

31
New cards

What does Role-Based Access Control (RBAC) do?

Assigns roles to users or systems and grants permissions based on those roles.

32
New cards

What does Identity-Aware Proxy (IAP) do?

IAP provides a central authorization layer for applications accessed via HTTPS, enabling application-level access control instead of relying solely on network-level firewalls.

33
New cards

What are Policies?

Rules or guardrails that govern access to resources and dictate what actions users or systems can perform. Help enforce security and compliance standards across an organization.

34
New cards

What do Hierarchical Policies do?

Allow organizations to create and enforce consistent access control policies across different levels of the organization. Ensure that access control rules are applied uniformly and can be easily managed and enforced.

35
New cards

What is Data Loss Prevention (DLP)?

DLP involves implementing measures to prevent the unauthorized disclosure of sensitive data.

36
New cards

How do AI Methods assist in scanning and protecting sensitive data?

AI-based DLP tools can automatically scan tables and files to identify and classify sensitive information. Use built-in detectors and custom rules to detect patterns, formats, and checksums associated with sensitive data.

37
New cards

What does Encryption do?

Helps protect data from unauthorized access by encrypting it with cryptographic algorithms.

38
New cards

What is Encryption-at-Rest?

Encrypting data stored on disk or in databases to protect it from unauthorized access.

39
New cards

What is Encryption-in-Transit?

Encrypting data transmitted over networks to prevent interception by unauthorized parties.

40
New cards

What are Customer-Managed Encryption Keys (CMEK)?

Allowing organizations to use their own encryption keys to encrypt data stored in the cloud.

41
New cards

What is Differential privacy?

A framework for ensuring that the output of a data analysis does not reveal information about individual data points.

42
New cards

What is k-Anonymity?

Ensuring that aggregate data represents groups of at least k individuals to prevent identification.

43
New cards

What does Access transparency do?

Ensures accountability and oversight by providing visibility into who accessed data and when.

44
New cards

What is a business case?

A document that Provides justification for undertaking a project or program.

45
New cards

What does the data governance business case do?

Establishes the direction and priorities, as well as the benefits for the program

46
New cards

What are the directions that a busines case needs to show value?

Improvement in efficiency, increase in direct business contributors and reduction in risk.

47
New cards

Besides building your team, what are other steps to building a data governance business case?

Clarify the business imperatives and use cases, identify your challenges and Determine the required capabilities.

48
New cards

What are the theree major categories of use cases?

Grow the business (revenue focused), Run the business (cost focused) and Protect the business (risk focused).

49
New cards

What oten are the data challenges?

Difficulty finding data, Difficulty trusting data and Difficulty understanding data.

50
New cards

What does the financial template for each use case need to contain?

Business risk (for doing and not doing data governance), Business value (benefits for data governance) and Costs (current and future operational and capital costs for data governance).

51
New cards

What are the deliverables of the business case?

A document describing each business case, the business benefits for each, the processes and organizations impacted in each case, as well as the assumptions used to determine the benefits of each use case

52
New cards

What are some areas to record as data governance measurements of success?

Productivity, Revenue, Cost, Data quality , Data protection