Lack of access control is often cited as the reason behind multiple versions of data. This results in different versions of the truth. Often companies will find, through this process, their key data is being updated and sometimes created in multiple systems by different people. And if you are a purveyor of bourbon, then your bourbon inventory and supply chain is key. If you supply electricity to homes, your customer meters, meter data, and outage information may be the most valuable data. If you are a trading organization, you look to your trades, your counterparties, and your financial instruments. Spend some time determining which data entities provide the most value first. Identify the single source of truth across your key data entities and lock it in. If you follow the MuleSoft recommended API-led connectivity approach, these can be applied to every experience layer API, using API Manager to apply policies, authorize consumers, and enforce connectivity via two-way Transport Layer Security (TLS). API policies, authentication, authorization, and encryption can do much of the heavy lifting here. Otherwise, like in Heist, things will go wrong.ĪPIs can help a data governance program build security into data management. If our data is an asset, then we need to protect it. That said, in a recent Netflix docuseries called Heist we discover that millions of dollars in Kentucky bourbon barrels were left unsecure and the results weren’t pretty. Protecting an asset seems like an obvious first step. In this blog, I will share nine important steps to build a solid data governance strategy with an API-led connectivity approach. Aligning to a “Data is an Asset” architecture principle means implementing a data governance strategy that protects, identifies, reuses, documents, and unifies its most valuable data. For data governance to be successful it needs to leverage the right combination of people, processes, and technology. The governance landscape can become increasingly complicated as teams take on new initiatives to modernize key lines of business systems with APIs, cloud migration, and data migration. It’s so rudimentary that The Open Architecture Framework Group (TOGAF) identifies it in an extensive example set of architecture principles and aligns it with two other data principles: Sharing and Accessibility. When discussing fundamental data principles to support, no one seems to bat an eye when suggesting they adopt the “Data is an Asset” principle. ![]() In a blog post entitled “ The 4 P’s of API Governance,” MuleSoft’s shared that many people think of governance as a four-letter word. The 9 most important steps in data governance and security
0 Comments
Leave a Reply. |