2.1.3.3. Data Access, Retention, and Classification Policies
š” First Principle: These policies fundamentally govern data access, storage, and management throughout its lifecycle, ensuring compliance, minimizing risk, and optimizing costs.
Effective data governance relies on clear policies for how data is accessed, for how long it is retained, and how it is classified based on sensitivity.
Key Concepts:
- Data Access: Controls who can view, modify, or delete data, enforced via IAM policies and access control lists (ACLs) on resources. This ensures least privilege.
- Data Retention: Specifies how long data must be stored, crucial for legal and regulatory compliance (e.g., HIPAA, GDPR). Amazon S3 Lifecycle policies can automate this.
- Data Classification: Categorizes data by sensitivity (e.g., public, internal, confidential, restricted) to apply appropriate security controls and storage tiers. This informs encryption choices, access restrictions, and retention periods.
Scenario: An organization needs to manage various types of data. Sensitive financial records must be stored for 7 years and only accessible by specific auditors. Public marketing materials can be accessed by anyone and retained indefinitely, but older versions can be moved to cheaper storage after 90 days.
Visual: Data Governance Policies
Loading diagram...
ā ļø Common Pitfall: Not classifying data. Without data classification, all data is often treated with the same level of security and retention, leading to unnecessary costs or inadequate protection for sensitive information.
Key Trade-Offs:
- Strict Retention vs. Storage Cost: Holding onto data for very long periods for compliance is costly. Regularly reviewing and adjusting retention policies can balance compliance with cost efficiency.
Reflection Question: How do data access policies (IAM), retention policies (S3 Lifecycle), and data classification fundamentally enable an organization to ensure compliance, minimize risk, and optimize storage costs for diverse data types?
These policies are vital for a robust, secure, and compliant data strategy, balancing security needs with operational efficiency and cost management.