{"id":10757,"date":"2016-12-01T13:33:45","date_gmt":"2016-12-01T18:33:45","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=10757"},"modified":"2024-06-13T17:25:41","modified_gmt":"2024-06-13T21:25:41","slug":"data-security-governance","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/","title":{"rendered":"What is Data Security Governance?"},"content":{"rendered":"<h3><b>The Latest Data Risk Landscape <\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Data now freely crosses the prior conceived thresholds that limit business potential. It floats about in the cloud, spreads between business units, and flows everywhere. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">But for all the change and opportunity that data represents, once it\u2019s created or collected, it is under threat of attack and misuse. With the number of reported data breaches doubling in the last ten years, and half a billion records exposed last year, our reliance on information is under increasing threat from a lack of security.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/www.itgovernanceusa.com\/blog\/wp-content\/uploads\/2024\/05\/image-12.png\" width=\"606\" height=\"351\" \/><\/p>\n<p><span style=\"font-weight: 400;\">With the exposure of personal data at industrial scale, the growth of data privacy legislation was inevitable. Companies and government agencies collecting and handling personally identifiable information (PII) must now comply with <\/span><span style=\"font-weight: 400;\">Payment Card Industry Data Security Standard (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/pci-dss\">PCI DSS<\/a>) and Health Insurance Portability and Accountability Act (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/hipaa\">HIPAA<\/a>) requirements in the United States, the General Data Protection Regulation (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/gdpr\">GDPR<\/a>) in Europe, and many international and local follow-on laws like POPI in South Africa, the <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/dpdpa-compliance\/\">DPDP Act<\/a> in India, KVKK in Turkey, and the California Consumer Privacy Act (<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/ccpa\">CCPA<\/a>).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data breaches also carry explicit costs. A recent Ponemon Institute study f<\/span><span style=\"font-weight: 400;\">ound that the average cost of a data breach was US$4.45 million in 2023, and the risk of having 10,000 stolen or lost records is ~26%. With more than a one-in-four chance of losing 10,000 records, would you take that risk if you could use technology to prevent it?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations stuck in old operational models and mindsets fail to recognize the importance of company-wide security protocols. To improve, they must address their need for what Gartner calls Data Security Governance and thus protect information in structured and coordinated events, not as an afterthought or remediation after a breach.<\/span><\/p>\n<h3><b>What is Data Security Governance?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Gartner defines data security governance (DSG) as \u201ca subset of information governance that deals specifically with protecting corporate data (in both structured database and unstructured file-based forms) through defined data policies and processes.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You define the policies. You define the processes. There is no one-size-fits-all solution to DSG. Furthermore, there is no single product that meets all of the needs of DSG. You must look at your data and weigh which areas have the greatest need and the most importance to your company. You take data governance into your own hands to avert disaster. Remember that your information is your responsibility. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While there are multiple pathways to safeguarding data &#8212; logical, physical, and human &#8212; \u00a0three\u00a0 primary software methods that IRI customers successfully employ are the classification, discovery, and de-identification (masking) of PII and other data considered sensitive.<\/span><\/p>\n<h3><b>Data Classification<\/b><\/h3>\n<p>In order to find and protect specific data at risk, it must first be defined in named categories or groups. Data so classified can be cataloged not only by its name and attributes (e.g., US SSN, 9 numbers), but also subject to computational validation (to distinguish it from other 9-digit strings), and sensitivity attribution (secret, sensitive, etc.).<\/p>\n<p>In addition to those assignments, data classes or class groups can be characterized by where they are located and\/or how they should be found\u00a0 (search method\/s) if their locations are unknown. Also possible is the global assignment of a remediation, or masking function, so that de-identification can be carried out consistently for all members of the class, regardless of location, preserving its referential integrity.<\/p>\n<h3><b>Data Discovery<\/b><\/h3>\n<p>To find sensitive data, search functions that may or may not be associated with data classes can be executed. Examples of discovery techniques include:<\/p>\n<ul>\n<li>RegEx or Perl Compatible Regular Expression (PCRE) matches<\/li>\n<li>exactly or fuzzy matching to lookup values<\/li>\n<li>special path or column filtering logic<\/li>\n<li>named entity recognition\u00a0 (NER)<\/li>\n<li>signature and facial recognition, etc.<\/li>\n<\/ul>\n<p>It is also possible to leverage machine learning in the recognition process. IRI supports semi-supervised machine learning in NER model building, for example, in its DarkShield product (below).<\/p>\n<h3><b>Data De-Identification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the ways to reduce, and <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"><span style=\"font-weight: 400;\">even nullify<\/span><\/a><span style=\"font-weight: 400;\">, the risk of data breaches is by <\/span><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">masking data<\/span><\/a><span style=\"font-weight: 400;\"> at rest or in motion, with field-level functions that render it protected but still usable to some extent. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><span style=\"font-weight: 400;\">Gartner analyst Marc Meunier, \u201cHow Data Masking Is Evolving to Protect Data from Insiders and Outsiders:\u201d<\/span><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Adopting data masking helps organizations raise the level of security and privacy assurance for their sensitive data \u2014 be it protected health information (PHI), personally identifiable information (PII) or intellectual property (IP). At the same time, data masking helps meet compliance requirements with security and privacy standards and regulations.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Most enterprises &#8212; either by virtue of internal rules or data privacy laws &#8212; have been, are now, or will soon be, making data masking a core element of their overall security strategy.<\/span><\/p>\n<h3>Proven Software Solutions<\/h3>\n<p><span style=\"font-weight: 400;\">IRI provides static and dynamic data masking solutions for structured data in:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">relational databases<\/span><\/li>\n<li><span style=\"font-weight: 400;\">flat files<\/span><\/li>\n<li>Excel<\/li>\n<li>ASN.1 CDR files<\/li>\n<li><span style=\"font-weight: 400;\">proprietary mainframe and legacy application sources<\/span><\/li>\n<li><span style=\"font-weight: 400;\">big data and cloud platforms (Hadoop, AWS, etc.)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">through its <\/span><a href=\"http:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> product or <\/span><a href=\"http:\/\/www.iri.com\/products\/voracity\"><span style=\"font-weight: 400;\">Voracity<\/span><\/a><span style=\"font-weight: 400;\"> platform, as well as data at risk in Excel via <\/span><a href=\"http:\/\/www.iri.com\/products\/cellshield\/cellshield-ee\"><span style=\"font-weight: 400;\">CellShield<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For PII and other data at risk in those structured sources, <em>as well as<\/em> in semi-structured and unstructured data sources like:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">NoSQL databases<\/span><\/li>\n<li><span style=\"font-weight: 400;\">free-form text files and application logs<\/span><\/li>\n<li><span style=\"font-weight: 400;\">EDI files (HL7, X12, FHIR, JSON, and XML)<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Parquet files<\/span><\/li>\n<li><span style=\"font-weight: 400;\">MS Office (Word, PowerPoint and Excel)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">.PDF documents<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Image files (DICOM, BMP, GIF, JPG, PNG, TIF)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">you would use the IRI <a href=\"https:\/\/www.iri.com\/products\/darkshield\">DarkShield<\/a> product to classify, discover, and de-identify it. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In these data masking tools, you can consistently apply (to preserve data and referential integrity) data masking methods like:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> blurring<\/span><\/li>\n<li><span style=\"font-weight: 400;\">deletion<\/span><\/li>\n<li><span style=\"font-weight: 400;\">encryption<\/span><\/li>\n<li><span style=\"font-weight: 400;\">redaction<\/span><\/li>\n<li><span style=\"font-weight: 400;\">pseudonymization<\/span><\/li>\n<li><span style=\"font-weight: 400;\">hashing<\/span><\/li>\n<li><span style=\"font-weight: 400;\">scrambling<\/span><\/li>\n<li><span style=\"font-weight: 400;\">tokenization<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">with or without the ability to reverse certain functions. <\/span><span style=\"font-weight: 400;\">Voracity &#8212; which includes those products &#8212; also folds data masking into data integration, data quality, and data migration operations, as well as data federation (virtualization), reporting and data wrangling for analytic operations. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Built-in data discovery, classification, metadata management, and audit logging features facilitate both automatic and manual assessments of the re-identifiability of affected records. S<\/span><span style=\"font-weight: 400;\">ee <\/span><a href=\"http:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">www.iri.com\/solutions\/data-masking<\/span><\/a><span style=\"font-weight: 400;\">\u00a0and <a href=\"https:\/\/www.iri.com\/solutions\/data-governance\">www.iri.com\/solutions\/data-governance<\/a> for more information, and contact your IRI representative if you need help creating or enforcing your DSG framework through a data-centric, or &#8216;startpoint&#8217; security approach.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Latest Data Risk Landscape Enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Data now freely crosses the prior conceived thresholds that limit business potential. It floats about in the cloud, spreads<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\" title=\"What is Data Security Governance?\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":17536,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34,3],"tags":[1452,1215,405,14,1784,13,1213,1214,861,1219,81,603,1388,520,369,400,24,1216],"class_list":["post-10757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","category-vldb-operations","tag-ccpa","tag-cellshield","tag-data-breach","tag-data-masking","tag-data-masking-software","tag-data-protection-2","tag-data-security-governance","tag-dsg","tag-gartner","tag-gdpr","tag-hadoop","tag-hipaa","tag-iri-darkshield","tag-iri-fieldshield","tag-nosql","tag-pci-dss","tag-vldb","tag-voracity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Data Security Governance? - IRI<\/title>\n<meta name=\"description\" content=\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Data Security Governance?\" \/>\n<meta property=\"og:description\" content=\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-01T18:33:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T21:25:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"622\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"What is Data Security Governance?\",\"datePublished\":\"2016-12-01T18:33:45+00:00\",\"dateModified\":\"2024-06-13T21:25:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\"},\"wordCount\":1058,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png\",\"keywords\":[\"CCPA\",\"CellShield\",\"data breach\",\"data masking\",\"data masking software\",\"data protection\",\"Data Security Governance\",\"DSG\",\"Gartner\",\"GDPR\",\"hadoop\",\"HIPAA\",\"IRI DarkShield\",\"IRI FieldShield\",\"NoSQL\",\"PCI DSS\",\"VLDB\",\"Voracity\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\",\"VLDB\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\",\"url\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\",\"name\":\"What is Data Security Governance? - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png\",\"datePublished\":\"2016-12-01T18:33:45+00:00\",\"dateModified\":\"2024-06-13T21:25:41+00:00\",\"description\":\"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png\",\"width\":1110,\"height\":622,\"caption\":\"FieldShield PII Discovery - Schema Data Class Search Results chart\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Data Security Governance?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Data Security Governance? - IRI","description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/","og_locale":"en_US","og_type":"article","og_title":"What is Data Security Governance?","og_description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","og_url":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/","og_site_name":"IRI","article_published_time":"2016-12-01T18:33:45+00:00","article_modified_time":"2024-06-13T21:25:41+00:00","og_image":[{"width":1110,"height":622,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/"},"author":{"name":"Donna Davis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"What is Data Security Governance?","datePublished":"2016-12-01T18:33:45+00:00","dateModified":"2024-06-13T21:25:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/"},"wordCount":1058,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","keywords":["CCPA","CellShield","data breach","data masking","data masking software","data protection","Data Security Governance","DSG","Gartner","GDPR","hadoop","HIPAA","IRI DarkShield","IRI FieldShield","NoSQL","PCI DSS","VLDB","Voracity"],"articleSection":["Data Masking\/Protection","IRI Business","VLDB"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/","url":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/","name":"What is Data Security Governance? - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","datePublished":"2016-12-01T18:33:45+00:00","dateModified":"2024-06-13T21:25:41+00:00","description":"This introductory article introduces Data Security Governance (as Gartner defines it), its background (data risk), and relevant software.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","width":1110,"height":622,"caption":"FieldShield PII Discovery - Schema Data Class Search Results chart"},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/vldb-operations\/data-security-governance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Data Security Governance?"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/www.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/image-1.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=10757"}],"version-history":[{"count":12,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757\/revisions"}],"predecessor-version":[{"id":17605,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/10757\/revisions\/17605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/17536"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=10757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=10757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=10757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}