Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Operationalizing the EDM Council’s New Cloud Data Management Capabilities (CDMC) Framework

Published December 20, 2021
Author

Omer Imran Malik

Senior Data Privacy Consultant at Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

The great cloud movement is not without its shortcomings. At one end of the spectrum, cloud migration has helped organizations overcome the age-old logistics issues and reduce operational overhead costs while adding scalability and continuous supply of horsepower for data computing and analysis at scale. On the other end, it has also given rise to many security and privacy threats that make it difficult for data management and governance teams to mitigate risks and meet compliance requirements.

The blog will touch upon the data management challenges that spawn during cloud migration, and how organizations can overcome these challenges and govern data efficiently by leveraging EDM Council’s new Cloud Data Management Capabilities (CDMC) framework.

Cloud Migration and Data Management Challenges

Cloud is here to stay and grow for an unforeseeable future. In fact, statistics report that the cloud computing market size is expected to grow to $947.3 billion by 2026 at 16.3% CAGR.

data management challenges

Regardless of its immense market size and growing popularity, there are still many challenges that keep organizations from leveraging cloud computing’s innate potential. Take, for instance, the inherent security risks associated with the cloud.

Security Challenges

According to a 2019’s cloud data security report, 56% out of 749 organizations cited security as one of the primary concerns behind slow cloud adoption. The concerns of such organizations are rightly placed as organizations move their massive volumes of sensitive data to the cloud, they open themselves up to security threats, such as malware attacks.

Similarly, when organizations migrate to the cloud, they must transfer some or part of their control over the data to the cloud service provider (CSP). This transfer of control creates further security risks, such as data leakage, and if left unattended, it may result in security breaches and attacks.

Compliance Challenges

Lack of security measures, such as access control, is also a common challenge, especially for large-scale organizations that are planning to move to a multi-cloud environment. However, as part of the continuous compliance monitoring, organizations are often required to oversee where their sensitive data resides, who has access to it, and what they can do with their level of access. Non-compliance may put organizations in hot waters, attracting severe fines or penalties by data protection and privacy regulations like GDPR, HIPAA, PCI DSS, and CPRA, to name a few.

Interoperability Challenges

Seamless data sharing between legacy on-prem applications and multi-cloud applications is only possible with seamless integration. Interoperability can pose a great challenge for organizations moving to the cloud because of the inherent limitations in legacy applications, such as compatibility. Consequently, it creates an internal hesitation between teams because of the changing architecture and the reconfiguration of the applications to make that integration happen.

Apart from the challenges listed here, inefficient or slow cloud migration may also be the result of a lack of sound migration strategy, or it may also be associated with getting a new IT team on board that has the right skill set for cloud data management.

Tackling Cloud Migration Challenges with the New CDMC Framework

EDM Council is the leading association in the data privacy and security sphere that advocates the standardization and implementation of data management and best practices for tackling associated challenges.

With the contribution of hundreds of organizations, including Securiti, IBM, Google Cloud, and AWS, EDM Council’s new Cloud Data Management Capabilities (CDMC) framework addresses the cloud migration challenges and defines best practices.

CDMC framework establishes the 6 main pillars of best practices around managing data within the cloud, which are further divided into 14 level-2 controls that can help organizations efficiently operationalize data governance.

Let’s take a look at the following key controls for seamless cloud data migration and management.

cloud migration challenges

Identify Data assets & Ensure Security Posture

Data assets should be at the core of an organization’s security posture because it is one of the top targets for cloud data breaches. The security and governance teams can’t protect an asset if they don’t know where it is, or it has been ignored which is something quite common when it comes to the unmanaged or shadow data assets spread across on-premise and the multi-cloud environment.

The path that leads to a robust security posture is having a controlled inventory of all the managed and unmanaged data assets, cataloged according to their residency, ownership, and lineage. A well-cataloged inventory of assets further allows security teams to define optimal security controls based on the sensitive data residing in those assets.

Lastly, organizations should shift to automation from the manual processes of listing inventories, fixing vulnerabilities, and monitoring security control sporadically. As threat actors are leveraging automated attacks for cyber breaches, it is high time for organizations to stay ahead of their foes by doing the same and embracing automated data asset discovery, cataloging, and security posture management.

Discover Sensitive Data & Classify, Data Catalog

The trio of data discovery, classification, and cataloging make the core parts of an organization’s data privacy and security strategies. Once an organization sifts through its on-prem and multi-cloud to find and catalog data assets, the next step is to look for the personally identifiable information (PII), including the sensitive personal information, stored on those data assets. An effective data discovery also takes into account the unstructured data that may live across spreadsheets, emails, etc.

Data discovery then leads to the data classification phase where all the sensitive data is then labeled according to its security and privacy labels. The security labels allow teams to make sure safe and authorized access to the data. The privacy labels enable the privacy teams to find the correct data and respond to data subjects' access requests, the right to be forgotten, the right to inform, the right to delete, and similar other data subject’s rights under regulations like GDPR and CPRA.

The data cataloging phase is where an organization creates an organized inventory of the data about the discovered and classified data (metadata), including tags, labels, or tables.

Govern Data Sovereignty and Cross-Border Movement

Data sovereignty and cross-border movement are governed by many global data protection regulations, mandating organizations to keep track of their cross-border data, place robust security measures, and ensure that the data transfer process meets judicial compliance.

To ensure all that, it is imperative to first understand where the sensitive, cross-border data resides, and what kind of sensitive data it is, such as medical, financial, etc. The further concerns include the type of jurisdictional regulations that apply to the data, such as CPRA or LGPD.

Monitor Access to Sensitive Data

With a clear picture of the sensitive data in various cloud data systems, organizations must also govern access to this data. The data discovery, classification, and cataloging phases simplify most of the heavy lifting at this point of the phase. To further proceed with the access governance phase, organizations must first identify the business role associated with the data as it allows the governance team to better regulate and monitor users’ access to the data. Organizations must establish role-based access control, starting with least privilege access, to make sure that the data security and integrity remain intact.

Automate enforcement, such as encryption or data masking, wherever possible to further strengthen the security of data while allowing teams to share and use it in a secure manner.

How Securiti Can Help

Data processing is constantly changing. Traditional tools that are just a snapshot won’t truly operationalize a program in a scalable way long-term. Securiti delivers an AI-powered autonomous data governance framework that operationalizes at a granular level, allowing organizations to integrate with their existing on-prem or multi-cloud environments with native integration, discover shadow and managed data assets and the structured and unstructured data across those assets:

  • Monitor in real-time the security posture of sensitive data assets
  • Define security policies against unauthorized access
  • Set alerts to observe and track anomalies
  • Establish privacy policies and set non-compliance alerts
  • Ensure data minimization by reducing access with role-based access control
  • Maintain processing records of all activities as proof of compliance

Request a demo to learn how you can operationalize the new CDMC framework with Securiti.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

AI TRiSM View More

What is AI TRiSM and Why It’s Essential in the Era of GenAI

The launch of ChatGPT in late 2022 was a watershed moment for AI, introducing the world to the possibilities of GenAI. After OpenAI made...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

View More

Top 10 Privacy Milestones That Defined 2024

Discover the top 10 privacy milestones that defined 2024. Learn how privacy evolved in 2024, including key legislations enacted, data breaches, and AI milestones.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New