{"id":18638,"date":"2022-03-31T10:00:37","date_gmt":"2022-03-31T18:00:37","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12371\/"},"modified":"2022-03-31T10:00:37","modified_gmt":"2022-03-31T18:00:37","slug":"news-12371","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12371\/","title":{"rendered":"3 strategies to launch an effective data governance plan"},"content":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 31 Mar 2022 17:00:00 +0000<\/strong><\/p>\n<p>Aware of the potential risks of sensitive data if not managed properly, you\u2019ve undertaken a data discovery process to learn where it\u2019s all stored. You\u2019ve classified this sensitive data\u2014confidential information like credit card numbers and home addresses collected from customers, prospects, partners, and employees\u2014as either non-business, public, general, confidential, or highly confidential. You\u2019ve assessed the risks to better protect it from exposure and the risk of theft or loss. Your next step is to govern your data. But what does that mean and how do you launch a data governance plan?<\/p>\n<p>Data governance is the process of managing data as a strategic asset. This means setting controls around data, its content, structure, use, and quality. Microsoft considers data governance to be the foundational pillar of an <a href=\"https:\/\/www.microsoft.com\/security\/business\/compliance\/information-protection\">enterprise data strategy<\/a>. All the preceding steps\u2014data discovery, data classification, and data protection\u2014are necessary to build your plan. When done right, data governance makes it easier for companies to ascertain their data is consistent, trustworthy, and properly used.<\/p>\n<p>To avoid those issues, ensure that you govern your data properly. Let\u2019s explore three steps to take when building a data governance plan.<\/p>\n<h2>1. Set lifecycle controls on sensitive data<\/h2>\n<p>Numerous laws and regulations dictate how long you must retain data and in what circumstances you should delete data. Many privacy laws require that you keep personally identifiable information (PII), such as names, identification numbers, home addresses, and IP addresses, only for as long as it has met its original purpose.<sup>1<\/sup><\/p>\n<p>Under GDPR Article 5(1)(c), the data minimization principle requires entities to process only \u201cadequate, relevant and limited\u201d personal data that is \u201cnecessary.\u201d<sup>2<\/sup> GDPR also encourages you to pseudonymize and encrypt this personal information.<\/p>\n<p>Your organization\u2019s data governance plan should take these data retention requirements into account. Tracking which file is subject to a retention or deletion regulatory requirement manually would be extremely challenging if not impossible. A better approach is to implement ongoing controls to auto-expire personal data or set up automated reminders to review data periodically to assess whether it\u2019s still in use or active. Another option is to have approvals in place before deleting documents to ensure you\u2019re deleting verified personal data and not inadvertently hurting the business by deleting the wrong content.<\/p>\n<h2>2. Operationalize data governance<\/h2>\n<p>After setting lifecycle controls to manage your company\u2019s sensitive data, it\u2019s time to define strategy and figure out how to operationalize the management of your data governance program. Data governance isn\u2019t a set-it-and-forget-it situation. You\u2019ll need ongoing processes to protect and govern sensitive data.<\/p>\n<p>However, a company\u2019s approach to data retention and deletion will vary based on the laws of its country and corporate policies. You need to define how often you review, delete, and archive sensitive data. Your company\u2019s Data Governance Officer or legal department can offer guidance on what\u2019s required.<\/p>\n<p>Automating these ongoing operations can ease the burden of management. One opportunity for automation is auto-labeling of secure documents at different confidentiality levels. If you don\u2019t properly label data as sensitive, you\u2019ll be unable to locate, identify, or successfully govern it.&nbsp;<\/p>\n<h2>3. Manage role-based access<\/h2>\n<p>A major tenant of <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a>, a security model that assumes breach and verifies each request, is to allow people to access only the resources that they use to complete their work. Assigning <a href=\"https:\/\/docs.microsoft.com\/azure\/role-based-access-control\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">role-based access <\/a>control helps you protect resources by managing who has access to resources, what they can do with those resources, and what resources they can access.<\/p>\n<p>Develop a detailed lifecycle for access that covers employees, guests, and vendors. Don\u2019t delegate permission setting to an onboarding manager as they may over-permission or under-permission the role. Another risk with handling <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access-management\">identity governance<\/a> only at onboarding is that this doesn\u2019t address changes in access necessary as employees change roles or leave the company.<\/p>\n<p>Instead, leaders of every part of the organization should determine in advance what access each position needs to do their jobs\u2014no more, no less. Then, your IT and security partner can create role-based access controls for each of these positions. Finally, the compliance team owns the monitoring and reporting to ensure these controls are implemented and followed.<\/p>\n<p>When deciding what data people need to access, consider both what they\u2019ll need to do with the data and what level of access they need to do their jobs.&nbsp;For example, a salesperson will need full access to the customer database, but may need only read access to the sales forecast, and may not need any access to the accounts payable app.&nbsp;It\u2019s about ensuring that people have the right access to the right information at the right time.<\/p>\n<p>Other questions to ask when building your plan include:<\/p>\n<ul>\n<li>How do you revoke access when someone no longer needs it due to a role change, offboarding, or another reason?<\/li>\n<li>Have you set up recurring and exception-based monitoring and reporting to check what people are doing with the access they have?&nbsp;<\/li>\n<li>Could implementing a <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access-management\/permissions-management\">permissions management solution<\/a> help reduce costs and workload to IT while increasing user productivity?<\/li>\n<\/ul>\n<p>Organizations need to be able to prove to auditors and regulators that privacy policies are being followed and enforced within the company. Restricting network access based on the roles of individual users can assist with that.<\/p>\n<h2>Secure sensitive data with data governance<\/h2>\n<p><a href=\"https:\/\/docs.microsoft.com\/azure\/cloud-adoption-framework\/scenarios\/data-management\/overview-data-governance\" target=\"_blank\" rel=\"noreferrer noopener\">Data governance<\/a> ensures that your data is discoverable, accurate, and trusted. Protect your sensitive data by launching a data governance plan that involves setting lifecycle controls of sensitive data, operationalizing data governance, and managing role-based access. As a follow-up to careful data discovery, data classification, and data protection, data governance can help you protect your sensitive data through its entire lifecycle according to industry regulations, which in turn will help you protect your employees, customers, prospects, and partners.<\/p>\n<p>Read more about data governance and protecting sensitive data:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/insidetrack\/driving-effective-data-governance-for-improved-quality-and-analytics\">Creating a modern data governance strategy to accelerate digital transformation<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/01\/microsoft-shares-4-challenges-of-protecting-sensitive-data-and-how-to-overcome-them\/\">Microsoft shares 4 challenges of protecting sensitive data and how to overcome them<\/a><\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.gdpreu.org\/the-regulation\/key-concepts\/personal-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR personal data \u2013 what information does this cover?<\/a>, GDPR.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR Article 5(1)(c),<\/a> EUR-Lex. 2016.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/31\/3-strategies-to-launch-an-effective-data-governance-plan\/\">3 strategies to launch an effective data governance plan<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/31\/3-strategies-to-launch-an-effective-data-governance-plan\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 31 Mar 2022 17:00:00 +0000<\/strong><\/p>\n<p>A data governance plan can help you effectively govern sensitive data so you can reduce risks from data breaches or leaks. Read three steps to launch a data governance plan.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/31\/3-strategies-to-launch-an-effective-data-governance-plan\/\">3 strategies to launch an effective data governance plan<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[12534,25159,4500,22073],"class_list":["post-18638","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-compliance","tag-compliance-series","tag-cybersecurity","tag-data-governance"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18638"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18638\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18638"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}