Description
Data Access Security Ownership Election Campaigns introduce an automated election process to identify and assign data owners to business data assets based on data usage patterns. Campaigns identify data owners candidates from among business stakeholders based on their activity and interaction with the data, and leverage crowd-source campaigns to engage the top users of the data in voting to elect owners.
Business users have better familiarity with the data they produce, use and manage on a daily basis - and often have a better understanding of who should have access to it - than IT or Identity Security teams. Identifying, electing, and assigning data owners from within the ranks of business users enables organizations to adopt a distributed organic approach to governing access to data - ensuring the decision makers are the ones closet and most familiar with both the data and the business’ needs. This approach helps organizations accomplish three important things:
- It ensure timely and accurate governance decisions - taking advantage of the knowledge and familiarity data owners have with their data, and the business initiatives.
- It reduces the burden from small centralized teams, that have to deal with large volumes of data, and lacking that context, would need to spend a lot more time reaching a decision.
- It promotes governance awareness across the business, as business users are now responsible for enforcing governance - and at the same time, ensure the policies enforced help drive and accommodate for business initiatives rather than block them - as they are done for the business, by the business.
To meet the needs of a diverse set of enterprises, Data Access Security continues to expand its capabilities to identify and assign data owners based on usage patterns
New Capabilities
- Identify and Assign Data Owners - Administrators can automatically identify and assign data owners to key data assets, based on usage patterns, analytics, and crowd-source based election among and by business stakeholders.
- Automate Collaborative Election Campaigns - Leveraging DAS patented election engine, Administrators can kick-off collaborative, crowd-source, election campaign, among the business stakeholders closest to the data, and allow the business to elect its own stakeholders. Voters will get insights into the best suited candidate, cast their votes, or proposed new candidates for ownership.
- Automated Election Reviews - To ensure the correct results, and add another layer of governance and control, administrators can designate owners to review the election results, approve the elected candidates for ownership, or override and add different stakeholders, more suitable for the Data Ownership role. Election review also provide another check-point to validate decisions, before automating ownership assignments.
- Automated Assignments - Administrators can instruct DAS to automatically set owners on data assets, based on the election results, with or without requiring a review. Once election, and review if applicable, are done - the elected owners will be automatically assigned as data owners, and will get an invitation to start governing their newly owned data assets through DAS. Alternatively, owners can opt to leave assignment manual, and set owners manually by themselves.
Problem
- Governance purview and access decisions are centralized in small IGA, Security or IT teams, placing a significant burden on these team in addition to their day-to-day jobs in the form of access requests, access reviews or remediating access.
- In addition, these groups often lack the context of both the data being governed, and the person requesting access, or whose access they are reviewing - which prolongs the governance decision making process and places additional burden on these teams, in gathering that information.
- Ideally, these decisions and actions will be delegated to Data Owners - who are most familiar with the data, as well as who should have access to it - however, the process for the identifying and assigning data owners is in itself a long, tedious process that is often done manually over Excel sheets and email threads - taking more time from these teams, and disrupting their work.
- In addition, managing data owners life-cycle, as people move in and out of the organization, is also a significant challenge, and keeping ownership up-to-date is a painstaking task.
- Failure to assign data owners may also leads to compliance gaps, fines, and reduce security posture.
Solution
Data Access Security Ownership Election Campaigns introduce an automated election process to identify and assign data owners to business data assets based on data usage patterns. Campaigns identify data owners candidates from among business stakeholders based on their activity and interaction with the data, and leverage crowd-source campaigns to engage the top users of the data, from among business stakeholders, in voting to elect owners.
Data Access Security Patented Ownership Election engine, analyze activity data and recommends potential ownership candidates, as well as automatically sets the audience to participate in the collaborative, crowd-source, voting campaigns, to elect and assign owners. Election results can be set to be reviewed by designated reviewers, before being automatically, or manually, assigned to the data assets themselves.
Reviewers can approve or reject elected owners, and / or assign owners they see fit according to company policy. Once assigned, Data Owners receive a notification inviting them to assume their governance responsibilities in Data Access Security, and can be natively incorporated into governance processes as reviewers in Access Certifications, recipients of security alerts, and more.
Admin
Voter View
Reviewer
Assignment
Important Dates
General Availability: Apr 9, 2025