It is expected that private data shared with the government/enterprise will be protected from criminals and that the government operates in ways that protect its own data from nation state actors. By implementing these Data Stewardship, plays that protect data entrusted to the government/enterprise, citizen services and commercial services can be securely delivered in accordance with regulations, policy, and reputation.
Today, most cybersecurity protections do not protect data well, are expensive to implement, and retard the pace of government/commercial service delivery to businesses and citizens. To increase the success rate of cybersecurity projects, government and enterprises require a new approach. Between RockITek and our partner’s The Emery Group, we have created a playbook of nine (9) key “plays” drawn from successful practices from the private sector and government to implement the “Continuous Data Stewardship Model.” The Data Stewardship plays included in this playbook consist of:
- Catalogue Data Assets
- Identify/Assign Data Stewards (Owners)
- Automate Discovery/Classification/Protection
- Map Data Life Cycles; address user and data steward requirements from start to finish
- Use Data “events” to drive decisions; monitor and report to data stewards life cycle uses, changes, attributes
- Automate data access and use policy
- Choose a modern data access and protection technology that enables persistent data management throughout the data’s life cycle
- Default to open; optimize through iterative policy implementation
- Integrate with Security Orchestration and Reporting system to enable real time user data access control decisions.
Complete the form to access your own copy of the Zero Trust Data Stewardship Playbook.