Data Lifecycle Management - A Quick Read

Data lifecycle management (DLM) is the process of managing data from its initial creation and use to its final disposition. It includes the management of data throughout its lifecycle, from data creation to data destruction. A DLM framework includes several tools and techniques for managing data throughout its lifecycle. Here is a basic framework for DLM, including tools for data classification, security controls for data sharing, monitoring data being shared through emails or cloud storage and tools for data deletion.

1.?????????????Data Classification: The first step in DLM is to classify the data based on its sensitivity and value. Use data discovery and classification tools to classify data based on sensitivity, ownership, and compliance requirements. Subsequently organizations can tag data with metadata such as classification labels and retention policies. These can be done using various tools such as:

  • Data Discovery Tools: These tools help to discover sensitive data across various sources.
  • Data Classification Tools: These tools automatically classify data based on predefined rules and policies.

?2.?????????????Security Controls for Data Sharing: Once the data is classified, security controls can be implemented to protect the data when it is shared. Some tools that can be used for security controls are:

  • Access Control: This tool restricts access to sensitive data by creating user permissions. Organizations can use data protection tools to enforce access controls and encryption policies. Data governance tools can be considered to track data lineage, enforce policies, and ensure compliance.
  • Encryption: These tools encrypt data when it is shared, making it unreadable to unauthorized users. Unencrypting is based on access control.
  • Digital Rights Management (DRM): This tool restricts the use and distribution of digital content.

?3.?????????????Tools for Data Deletion: This is the area that is never taken seriously in any organization. Data that is no longer needed or is outdated should be deleted to reduce storage costs and to minimize the risk of a data breach. If not deleted, at least the old data should be archived to reduce storage costs. Some tools that can be used for data deletion are:

  • Data Deletion Tools: These tools can delete data that is no longer needed, such as temporary files or backups. Scripts to manually identify older data can also be written, however, these are difficult to manage in large organizations.
  • Data Sanitization Tools: These tools can remove all traces of data from a storage device, making it unrecoverable.
  • File Shredders: These tools overwrite the data with random characters, making it unreadable and irretrievable.
  • Hard Disk Destruction: Degaussing is considered very formidable, but nothing can beat the good old hammer to physically destroying the hard disk.

?4.?????????????Monitoring Data Being Shared: To ensure that data is not being shared improperly, organizations can monitor the data being shared using various tools. These tools include:

  • Data Loss Prevention (DLP) Tools: These tools can prevent sensitive data from being transmitted outside of the organization.
  • Email Security Tools: These tools scan emails for sensitive data and prevent it from being transmitted outside the organization.
  • Cloud Storage Security Tools: These tools monitor cloud storage activity and alert administrators of any suspicious activity.
  • Network Traffic Analysis (NTA) Tools: These tools monitor network traffic and can detect any unauthorized data transfers.

?Overall, the framework for data lifecycle management includes a comprehensive approach to managing data from creation to deletion, including data classification, security controls for sharing, tools for data deletion, and monitoring data sharing through emails and cloud storage. In summary, a DLM framework includes tools for each of these steps, from creation to disposal. By using the best in line tools and best practices, organizations can ensure that their data is secure and compliant with regulatory requirements. And most importantly, the visibility that this framework provides on the asset base and data flows, prepares the organizations for any breach.

Aditya Gautam

Group Data Privacy Lead - Adani Enterprises Ltd. | Ex-PwC | FIP, CIPM, CIPPE, CISM, BS10012, DCPP, ISO27001LA

2 年

Neatly articulated, Thanks for posting this Amit Dhawan Sir

Jaimandeep Singh

Cybersecurity Strategist & Architect | PhD (Cybersecurity, NFSU) | Indian Army Veteran Lt Colonel | MTech | CISSP | Cyber Law (NLSIU) | CEH (Master)

2 年

Amit Dhawan sir, thx for sharing your insights on the organizational culture and the need for encryption. I believe that there is inescapable need for an organization wide policy on data retention, especially with the new data protection bill 2022 on the horizon. It is particularly relevant for the organizations handling Personally Identifiable Information (PII). I had submitted my views and feedback to the #MeitY on the data protection bill 2022, and can be accessed from here: https://www.dhirubhai.net/posts/jaimandeep-singh-07834b1b7_feedback-on-draft-digital-personal-data-activity-7009026760507813888-lTZr?utm_source=share&utm_medium=member_desktop

回复
Neelu Tyagi ??

Dexterity - Cloud Strategy| Cloud Solution Architecture | CCOE Strategist | Cyber Security | Cloud Native Migration Specialist | GTM-Sales | AWS, Azure, GCP | GenAI | Cloud Expert-Advisor to Executive Levels|

2 年

Great article to get some insights on DLM, highlighting security aspects, thanks for sharing it Amit Sir!!

Dr Bijendra Negi

Former Adviser at Ministry of New and Renewable Energy, New Delhi

2 年

Great! Congratulations!

回复
Vikram Jeet Singh

Partner @ PwC | Cyber Security Professional | Consultant | Speaker | Endurance Athlete

2 年

Good one Amit. Unfortunately lots of organizations pay attention to just parts of this lifecycle and that leads to issues.

要查看或添加评论,请登录

Amit Dhawan的更多文章

  • Navigating the New Frontier: Cybersecurity in the Age of Generative AI

    Navigating the New Frontier: Cybersecurity in the Age of Generative AI

    Introduction In today's fast-paced digital era, generative AI has become a cornerstone of technological advancement…

    17 条评论
  • Conquering the Heights: My Marathon Experience in Leh

    Conquering the Heights: My Marathon Experience in Leh

    Running a marathon is a test of human endurance, determination and mental fortitude. It is not just a physical…

    63 条评论
  • Train existing staff or hire afresh

    Train existing staff or hire afresh

    I was recently invited to be part of a panel at BSides Security Conference, New Delhi. The topic was "What CISOs look…

    10 条评论
  • 5G – The Security Challenges and how to make sense of it all?

    5G – The Security Challenges and how to make sense of it all?

    The Tenants of 5G There are two facts that we face today – first is the requirement is of faster data. The major…

    7 条评论
  • Smart security in the era of Gen V

    Smart security in the era of Gen V

    At one stage in life, we were amazed at polymorphic virus – the 2nd/3rd Generation malware that could change the way it…

    8 条评论
  • Is ShadowIT a Threat ?

    Is ShadowIT a Threat ?

    The Internet as a Threat Remember the days, just a few years back, when we realized porn and drugs are available on the…

    2 条评论
  • Performance Review- Are fights good?

    Performance Review- Are fights good?

    Performance Review - Per Cambridge, the definition is “the act of examining someone or something in order to judge…

社区洞察

其他会员也浏览了