PART III
Data Security, Privacy, and Regulatory Compliance

CHAPTER 8 Overview of Risk Management for Master Data

CHAPTER 9 Introduction to Information Security and Identity Management

CHAPTER 10 Protecting Content for Secure Master Data Management

CHAPTER 11 Enterprise Security and Data Visibility in Master Data Management Environments

As we stated in the beginning of the book, one of the major goals of Master Data Management strategy is the creation of an authoritative, cleansed, and integrated system of record for a specific business domain such as customers, products, partners, and so on. Collecting and integrating such information in one place creates an extremely useful, valuable, and highly leverageable information management opportunity. At the same time, it makes these integrated data platforms attractive targets for unauthorized access and subject to various types of information security risks, including risks of noncompliance with numerous government and industry regulations and laws.

This heightened risk exposure has become a key concern of information security officers and regulatory compliance groups and therefore has to be well understood in order to create business-driven, value-added MDM solutions that don’t put the enterprise in jeopardy. This part of the book, therefore, will review various aspects of information security risks and the key regulatory compliance requirements driving the issues of security and privacy to the forefront of MDM implementations, with an emphasis on Master Data Management for Customer Domain solutions such as MDM Data Hubs that integrate and need to protect confidential data and personally identifiable information (PII) about customers, prospects, business partners, service providers, and other parties. In addition, this part discusses approaches and strategies for managing and mitigating information security risks. This discussion includes information technology architecture and infrastructure implications of developing and deploying secure and integrated MDM solutions. The discussion of these topics is organized in the following fashion: Chapter 8 discusses regulatory requirements for security, privacy, and confidentiality of information. Chapter 9 provides an introduction to information security and identity management technologies, Chapter 10 talks about information content protection, and Chapter 11 concludes with a discussion of data security and visibility concerns and implications for the MDM architecture and design.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.209.152