Choose the Appropriate Technology to Enforce Data Governance
It is the overall management of the
- availability
- usability
- integrity
- security
of data used in an enterprise
AWS Data Governance
- Data Catalog – A data catalog management system that monitors every asset in the data lake and provides data stewards the ability to manage access to data assets.
- ETL – Extract, Transform, and Load services that integrate with policy-based masking services.
- Masking – A policy-based solution that extracts and masks sensitive PII data before it ever lands in a data lake.
- Matching and de-identified data transfer – Securely transfer second-party data using a decentralized trust model.
De-identified data lake (DIDL)
- It is an architectural approach
- designed to use data as a competitive differentiator,
- reduces the risks associated with managing all data, particularly personally identifiable information.
- Solve the data privacy problem
- de-identifying and protecting sensitive information, before it even enters your data lake.
- minimizing storage and use of PII,
- significantly reduces the risk for data breaches and misuse of data
AWS Certified Big Data - Specialty Free Practice TestTake a Quiz