It's 833 Information Governance Chapter 10
Its 833 Information Governancechapter 10 Information Governance A
Identify current trends that are considered weaknesses in IT processes. Describe IG best practices in the area of IT governance. Identify the foundational programs or areas that support the IG efforts in IT. Explain what is meant by data governance, how it differs from IT, and outline the steps in implementing an effective data governance program. Discuss the creators and reasons behind the data governance framework. Define information management and its subcomponents, including master data management (MDM) and information lifecycle management. Clarify what data modeling is, the different approaches to data modeling, and its goals. Recognize the purpose of IT governance and identify or provide examples of several IT governance frameworks, including their distinguishing features. Describe ISACA and its responsibilities, and identify who created ValIT and why. Analyze issues related to IT and IG, focusing on accountability, best practices that deliver business value, aligning IG with business objectives, standardizing business terms, and supporting programs like data governance, information management, and IT standards. Explain the processes, controls, and steps involved in effective data governance: recruiting executive sponsors, assessing current data state, computing data value, setting visions and strategies, assessing risks, implementing strategies, managing change, assigning data quality ownership to business units, and monitoring progress. Describe the Data Governance Institute (DGI) framework. Detail the key components of information management—such as master data management, information lifecycle management, data architecture, and data modeling—and elaborate on data modeling concepts, including conceptual, enterprise, logical, and physical modeling, as well as data integration and reference data management. Compare various data models in terms of efficiency and value creation. Discuss the importance of a stakeholder-focused approach in IT governance and outline prominent frameworks like Cobit®, ITIL, ValIT®, and ISO38500. Provide an overview of ISACA, its history, and its certifications, emphasizing its role in developing internationally recognized IT governance standards. Describe Cobit®’s structure, principles, enablers, and evolution into Cobit 5, highlighting its end-to-end enterprise approach. Explain the role of IT Governance Institute in providing guidance, including practices like Value IT and its integration with Cobit®. Summarize ITIL’s history, structure, and its focus on service lifecycle management through its core volumes. Cover ISO/IEC standards, including ISO/IEC 20000 and ISO/IEC 38500:2008, as standards for IT service management and governance. Address best practices in database security, such as inventory assessments, monitoring, privileged access controls, data masking, and automation, along with the limitations of perimeter security. Discuss Identity and Access Management (IAM), including its goals, challenges, and the importance of continual auditing and updating. Examine security threats from insiders and external actors, and outline solutions involving security measures, education, policies, and monitoring. Review laws like the Electronic Communications Privacy Act, and discuss perimeter security limitations, advocating for a defense-in-depth strategy with layered security controls such as firewalls, antivirus software, intrusion detection, biometric verification, and physical security. Explore advanced security solutions including IRM and DLP, emphasizing their roles in securing data in transit and at rest, along with hybrid approaches that combine multiple security technologies. Conclude with strategies for securing data when it leaves the organization, emphasizing that control does not equate to ownership, and the importance of architectural design patterns such as Thin Client, Protected Data, and Stream Messaging to ensure persistent and self-protecting security for digital information.
Paper For Above instruction
Information Governance (IG) is essential for aligning IT processes with organizational objectives, ensuring accountability, and securing data assets. In recent years, organizations have faced weaknesses in IT processes, such as lack of standardization, insufficient accountability, and inadequate risk management. Addressing these issues requires a comprehensive understanding of IG best practices, foundational programs, and technological frameworks that facilitate effective governance.
Data governance plays a pivotal role in IG by establishing processes and controls to ensure data accuracy, consistency, and security. It differs from IT governance by focusing specifically on data management at the enterprise level, with an emphasis on data quality, ownership, and lifecycle management. The creation of data governance frameworks is often driven by industry standards and best practices, with prominent initiatives like the Data Governance Institute (DGI) providing structured models for implementation. Implementing effective data governance involves several steps: recruiting strong executive sponsors, assessing the current state of data, calculating the potential value of quality data, establishing strategic visions, managing risks, executing change management, and monitoring progress to fine-tune initiatives.
Information management encompasses the entire lifecycle of organizational data, including master data management (MDM), which aims to provide a single, reliable source of critical data across business units. Information lifecycle management (ILM) ensures data is handled appropriately at different stages of its usefulness, from creation to deletion. Data modeling is a crucial component of information architecture, illustrating relationships between data entities through various approaches—conceptual, enterprise, logical, and physical models—each serving distinct purposes. Data integration strategies merge disparate data sources to support comprehensive analysis, while reference data management categorizes data to streamline operations at the database level.
Effective IT governance frameworks—such as COBIT®, ITIL, ValIT®, and ISO38500—offer structured approaches to aligning IT initiatives with organizational goals. COBIT®, developed by ISACA, provides a process-based model emphasizing risk mitigation and value optimization through control objectives and enablers, structured across organizational levels. The 2012 release, COBIT 5, enhanced this model by integrating other frameworks and emphasizing a holistic governance approach. ISACA also oversees certifications to ensure professionals adhere to best practices; it was founded in 1967 and has since grown into a global authority in IT governance and security.
ITIL, originating in the UK in the 1980s, is a comprehensive set of best practices for IT service management, structured around the service lifecycle: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement. It promotes standardized processes and aligns IT services with business needs. The ISO/IEC standards complement these frameworks; ISO/IEC 20000 provides a global standard for IT service management, while ISO/IEC 38500 offers principles for effective governance by senior executives and directors.
Database security is vital in preventing unauthorized access and protecting sensitive data. Best practices include conducting inventories, assessing vulnerabilities, monitoring activity, controlling privileged access, deploying data masking, and automating security policies. Traditional perimeter defenses—firewalls, passwords, and two-factor authentication—are increasingly inadequate in a complex, extended enterprise environment. A defense-in-depth strategy involves layered security measures such as intrusion detection systems, biometric verification, physical security, and automated monitoring.
Identity and Access Management (IAM) aims to prevent unauthorized access through continual auditing, role-based access control, and evolving roles to address cybersecurity challenges. Insider threats are particularly insidious, often accounting for significant data breaches. Solutions involve comprehensive security policies, security awareness training, monitoring, and enforcement. Additionally, cyber laws like the Electronic Communications Privacy Act (ECPA) regulate interception and disclosure of electronic communications, but limitations in traditional security techniques necessitate adopting advanced, layered approaches.
Security strategies extend into the realm of data in transit and at rest. Data Loss Prevention (DLP) technologies, including content scanning, classification, and tainting, help prevent sensitive data from leaving the organization. Information Rights Management (IRM) and Enterprise Rights Management (ERM) software provide persistent, self-protecting security for documents, allowing policy enforcement throughout the document lifecycle. Hybrid approaches combining DLP, IRM, and other technologies create robust security architectures, ensuring confidentiality even in mobile and dispersed environments.
Securing data once it leaves the organization involves architectural considerations such as the use of Thin Clients, Remote Wipe capabilities, Data Stream Messaging, and Labeling. These patterns ensure that data remains under control, and security is embedded into the very fabric of enterprise communications and storage. This way, organizations maintain sovereignty over their information assets, reducing the risk of leaks or unauthorized access, regardless of device or location.
References
- Bernard, S. A. (2013). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Portfolio.
- ISACA. (2019). COBIT 2019 Framework: Introduction and Methodology. ISACA.
- Phadke, M. S., & Thakur, R. (2017). Information Security Management: Concepts and Practice. CRC Press.
- ISO/IEC. (2011). ISO/IEC 38500:2015. Information technology — Governance of IT for the organization.
- IT Governance Institute. (2007). COBIT 4.1. IT Governance Institute.
- Office of Government Commerce. (2007). ITIL Service Lifecycle Publications. The Stationery Office.
- O’Neill, M. (2013). Effective Data Governance: Driving Business Value from Data. McGraw-Hill Education.
- Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. CRC Press.
- Vacca, J. R. (2014). Computer and Information Security Handbook. Elsevier.
- Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security. Cengage Learning.