Applying Data Governance in Identity Management: To Serve and Protect"
|
|
|
- Beatrice Cummings
- 10 years ago
- Views:
Transcription
1 Applying Data Governance in Identity Management: To Serve and Protect" Brendan Bellina Identity Services Architect Information Technology Services University of Southern California
2 Distributed Data = Leaks Security Breach User Error Name SSN Intentional Inadequate Training Equipment Theft Recycled Equipment Date of Birth Gender Ethnicity Address Phone EDUCAUSE 2008 Conference" 2!
3 EDUCAUSE 2008 Conference" 3!
4 Development of the Person Registry (PR) Establishes authoritative Person ID - USCID" Real-time communication with primary SORs (SIS, AIS, ivip, USCard)" Stores/matches identifying data - name, Date of Birth, Social Security Number" Required agreements on:" Ø Common data definitions (DOB and SSN)," Ø Data ownership hierarchy for updates" Ø Policies for merging identities and USCIDs " EDUCAUSE 2008 Conference" 4!
5 Development of the Global Directory Service (GDS) GDS cloud includes PR, MU, the interfaces to them: GDS LDAP and Shibboleth; and metadirectory processes" Nightly updates to active person, account, and groups information based on inputs from MU, the PR, and group exceptions" Provides authentication, authorization, attributes, and group services through LDAP and Shibboleth" Required agreements on:" Ø Standard schema definitions (eduperson, educourse)," Ø Access controls for anonymous and authenticated queries" Ø Request process for data access and group definitions" Ø Policies on addition of new data elements and types " EDUCAUSE 2008 Conference" 5!
6 Data Governance brings together cross-functional teams to make interdependent rules or to resolve issues or to provide services to data stakeholders. These crossfunctional teams - Data Stewards and/or Data Governors - generally come from the Business side of operations. They set policy that IT and Data groups will follow as they establish their architectures, implement their own best practices, and address requirements. Data Governance can be considered the overall process of making this work. EDUCAUSE 2008 Conference" 6!
7 When to use formal Data Governance When one of four situations occur: Ø The organization gets so large that traditional management isn't able to address data-related cross-functional activities. Ø The organization's data systems get so complicated that traditional management isn't able to address data-related crossfunctional activities. Ø The organization's Data Architects, SOA teams, or other horizontally-focused groups need the support of a crossfunctional program that takes an enterprise (rather than siloed) view of data concerns and choices. Ø Regulation, compliance, or contractual requirements call for formal Data Governance. Ø " EDUCAUSE 2008 Conference" 7!
8 Data Governance Principles Eight Principles:" Ø Integrity" v All data requests are reviewed in committee, including central IT requests" v No rubber-stamping. No railroading. No exceptions." Ø Transparency" v Committee meetings are open and held during lunch hours." v Policies are posted on GDS website" Ø Auditability" v All Data Requests are retained and tracked in the USC Wiki" Ø Accountability" v Data Access is granted only following approval. No technical overrides." " " " EDUCAUSE 2008 Conference" 8!
9 Ø Stewardship" v Data Stewards must review and approve all data requests." v Department IT leaders are engaged in the review process." Ø Checks-and-Balances" v ITS Architect attends all meetings but does not vote." v All requests go through a meeting with ITS prior to committee to ensure all appropriate questions are considered." v ITS makes no production changes for data release without committee approval." Ø Standardization" v Establish sub-committees and spin-off efforts to determine standardization on role definitions and data usage." v USC is an active participant in relevant collaborative standards development (MACE-Dir, Internet2, EDUCAUSE, InCommon working groups)." Ø Change Management" v Requests are maintained in the USC Wiki" v Access control changes are maintained as prior versions for historical review" EDUCAUSE 2008 Conference" 9!
10 IAM Data Governance Committees All committees are chaired by the Director of the Office of Organization Improvement Services, Margaret Harrington." Directory Steering Committee - management committee meets every 3 weeks" focuses on policy regarding data acquisition and release, integration, and communication" attendees include senior management representatives from academic schools, administrative departments, IT Security Office, General Counsel" GDS Executive Committee - management committee every other week" focuses on technical and staffing issues affecting direction and prioritizations" attendees include management representatives from SOR s and GDS team" Data Team - technical committee meets every 3 weeks" focuses on operational issues affecting SOR s and PR/GDS" attendees include representatives from SOR s and GDS team" EDUCAUSE 2008 Conference" 10!
11 EDUCAUSE 2008 Conference" 11!
12 Data Team EDUCAUSE 2008 Conference" 12!
13 GDS Executive Committee EDUCAUSE 2008 Conference" 13!
14 Directory Services Steering Committee EDUCAUSE 2008 Conference" 14!
15 Role of Central IT in Data Governance Central IT is NOT a data steward" Central IT is a subject matter expert regarding technology" Central IT is implementer, NOT policy maker" Central IT provides an enterprise view, providing a counter-balance to department-centric development" Central IT acts as a representative of the institution in the development of external standards" EDUCAUSE 2008 Conference" 15!
16 Attribute Access Request Process Documented at GDS website" Chaired by Director of the Office of Organizational Improvement" Required for all data requests to GDS content" Meeting with ITS and application sponsor occurs prior to Directory Steering Committee" Directory Steering Committee reviews all new requests" Data Stewards must approve requests" Requests must be reauthorized every 2 years" EDUCAUSE 2008 Conference" 16!
17 Authorization Model Service Provider must explicitly define user population" Ø based on attributes in the GDS provided by the SOR s, or" Ø as a discretionary (exception) group recorded in the GDS" GDS Authorization Group is used to record the application user population and assign an entitlement for the service" Shibboleth (or LDAP) releases attributes to the Service Provider only for users with the entitlement value for the service" Authorization to use a service is determined at the Identity Provider based on GDS attributes BEFORE any attributes about the user are released to the service." EDUCAUSE 2008 Conference" 17!
18 Challenges EDUCAUSE 2008 Conference" 18!
19 Maintaining consistent engagement of departmental leaders" Perception of governance process being a barrier to rapid deployment of services" Services without Sponsors" Lack of Knowledge Leading to Missteps and Resistance" Persisting Contrary IT Practices" Ø Departmental portals and proxies grouping users and data" Ø Lack of data requirements for projects" Ø Allowing major projects to bypass governance and review" Ø Fabricated accounts in production to facilitate support" Ø Shadow and test systems providing access to production data" Ø Administrators taking liberty with data access when pressed" EDUCAUSE 2008 Conference" 19!
20 Links - USC GDS website: - Additional Presentations: - Contact the author via [email protected] " EDUCAUSE 2008 Conference" 20!
University of Southern California ivip Guest/Affiliate System
University of Southern California ivip Guest/Affiliate System Online documentation available at: http://www.usc.edu/its/iam/ivip/ Questions about the USC ivip system can be directed to [email protected].
Typical Directory Implementations at Institutions in Higher Education
Typical Directory Implementations at Institutions in Higher Education Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern
Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees
Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the
Data Governance: A Tale Of Two Approaches
Data Governance: A Tale Of Two Approaches Hugh McCabe, Manager, Information Technology and Services, [email protected] Information Technology and Services (http://its.syr.edu) Syracuse University Background
Vermont Enterprise Architecture Framework (VEAF) Master Data Management (MDM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Master Data Management (MDM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
The DGI Data Governance Framework
WHEN WHY to achieve 1 Develop a value statement 2 Prepare a roadmap 3 Plan and Fund 4 Design the program WHO WHAT 5 Deploy the program 6 Govern the data 7 Monitor, Measure, Report HOW The DGI Framework
Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for informational purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
Expanding Data Governance Into EIM Governance. [email protected] 321-438-0774. The Data Governance Institute page 1
Gwen Thomas President, page 1 has three arms: 1. Training/consulting 2. Membership (The Data Governance & Stewardship Community of Practice) ce) at www.datastewardship.com 3. Information services, publishing
Gwen Thomas, The Data Governance Institute. Abstract
WHEN WHY to achieve WHO WHAT HOW The DGI Framework Gwen Thomas, The Institute Abstract can mean different things to different people. Adding to this ambiguity, governance and stewardship can be perceived
The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money
A DataFlux White Paper Prepared by: Gwen Thomas The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money Leader in Data Quality and Data Integration www.dataflux.com
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Mt. San Antonio College. Information Technology Report Card. EDUCAUSE: 2013 Top 10 IT Issues
Mt. San Antonio College Information Technology Report Card EDUCAUSE: 2013 Top 10 EDUCAUSE releases an annual list of the top 10 issues affecting higher education institutions. The 2013 list emphasizes
Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University
Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
The Key Components of a Data Governance Program. John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc
The Key Components of a Data Governance Program John R. Talburt, PhD, IQCP University of Arkansas at Little Rock Black Oak Analytics, Inc My Background Currently University of Arkansas at Little Rock Acxiom
Solutions Master Data Governance Model and Mechanism
www.pwc.com Solutions Master Data Governance Model and Mechanism Executive summary Organizations worldwide are rapidly adopting various Master Data Management (MDM) solutions to address and overcome business
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
Implementing a Data Governance Initiative
Implementing a Data Governance Initiative Presented by: Linda A. Montemayor, Technical Director AT&T Agenda AT&T Business Alliance Data Governance Framework Data Governance Solutions: o Metadata Management
US Department of Education Federal Student Aid Integration Leadership Support Contractor January 25, 2007
US Department of Education Federal Student Aid Integration Leadership Support Contractor January 25, 2007 Task 18 - Enterprise Data Management 18.002 Enterprise Data Management Concept of Operations i
Knowledgent White Paper Series. Developing an MDM Strategy WHITE PAPER. Key Components for Success
Developing an MDM Strategy Key Components for Success WHITE PAPER Table of Contents Introduction... 2 Process Considerations... 3 Architecture Considerations... 5 Conclusion... 9 About Knowledgent... 10
Data Governance: Measure Twice, Cut Once. April 14, 2015
Data Governance: Measure Twice, Cut Once April 14, 2015 Dr. Stephen Morgan, SVP & CMIO, Carilion Clinic Randy L. Thomas, FHIMSS, Associate Partner, Encore, A Quintiles Company DISCLAIMER: The views and
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
Enterprise Information Management Capability Maturity Survey for Higher Education Institutions
Enterprise Information Management Capability Maturity Survey for Higher Education Institutions Dr. Hébert Díaz-Flores Chief Technology Architect University of California, Berkeley August, 2007 Instructions
Data Governance: From theory to practice. Zeeman van der Merwe Manager: Information Integrity and Analysis, ACC [email protected].
Data Governance: From theory to practice Zeeman van der Merwe Manager: Information Integrity and Analysis, ACC [email protected] 2010 SUNZ Conference 16 February 2010 Why Data Governance? Why
Data Governance in a Siloed Organization
The First Step in Master Data Management Data Governance in a Siloed Organization Kelle O Neal Managing Partner [email protected] Gurinder Bahl Principal Product Manager, Oracle [email protected]
Federated Directory Services
Federated Directory Services for the connected enterprise Federated Directory Server helps overcome the challenge of distributed identity data, which is a significant hurdle to the deployment of new enterprise
Solutions. Master Data Governance Model and the Mechanism
Solutions Master Data Governance Model and the Mechanism Executive summary Organizations worldwide are rapidly adopting various Master Data Management (MDM) solutions to address and overcome business issues
Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
Data Governance With a Focus on Information Quality
MIT Information Quality Industry Symposium, Information Quality By Gwen Thomas, President, The The Data Governance Institute Objectives of this presentation Identify interdependencies between Information
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Deliver the information business users need
White paper Deliver the information business users need Building the Intelligence Competency Center Table of Contents 1 Overview 1 Components of the BICC 3 Typical scenarios 5 Approach to building the
Existing Technologies and Data Governance
Existing Technologies and Data Governance Adriaan Veldhuisen Product Manager Privacy & Security Teradata, a Division of NCR 10 June, 2004 San Francisco, CA 6/10/04 1 My Assumptions for Data Governance
Open Group SOA Governance. San Diego 2009
Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes
Three Campus Case Studies: Managing Access with Grouper
Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul
Georgia State University: Building an Identity Management Infrastructure for the euniversity
NMI-EDIT NMI Integration Testbed Identity and Access Management Case Study Series Georgia State University: Building an Identity Management Infrastructure for the euniversity October 2004 NMI-EDIT Case
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
Recommended Roadmap for Shared Inspection Management Solutions
Recommended Roadmap for Shared Inspection Management Solutions This roadmap outlines the phases of activities required in order to plan, design and implement a shared inspection management solution. While
Master Data Management
Master Data Management Managing Data as an Asset By Bandish Gupta Consultant CIBER Global Enterprise Integration Practice Abstract: Organizations used to depend on business practices to differentiate them
Enterprise Data Governance
Enterprise Aligning Quality With Your Program Presented by: Mark Allen Sr. Consultant, Enterprise WellPoint, Inc. ([email protected]) 1 Introduction: Mark Allen is a senior consultant and enterprise
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
Central Person Registry Requirements. Identity and Access Management Central Person Registry Software Requirements Specification
Identity and Access Management Central Person Registry Software Requirements Specification 22 September 2011 1 ! "#$%&!'(!)'*+&*+,!!! "#$%&' (!!)!! *+&,-*.*#/-*$,' (!!)0! "1"-&2'$3&43*&5' (!!)(! +$#62&,-'$3&43*&5'
Data Governance Primer. A PPDM Workshop. March 2015
Data Governance Primer A PPDM Workshop March 2015 Agenda - SETTING THE STAGE - DATA GOVERNANCE BASICS - METHODOLOGY - KEYS TO SUCCESS Copyright 2015 Noah Consulting LLC. All Rights Reserved. Industry Drivers
How To Improve Your Business
IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision
Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology
UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an
Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer
Using SAP Master Data Technologies to Enable Key Business Capabilities in Johnson & Johnson Consumer Terry Bouziotis: Director, IT Enterprise Master Data Management JJHCS Bob Delp: Sr. MDM Program Manager
Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper
Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-top8-113012
Vermont Enterprise Architecture Framework (VEAF) Master Data Management Design
Vermont Enterprise Architecture Framework (VEAF) Master Data Management Design EA APPROVALS Approving Authority: REVISION HISTORY Version Date Organization/Point
August 2014 San Antonio Texas The Power of Embedded Analytics with SAP BusinessObjects
August 2014 San Antonio Texas The Power of Embedded Analytics with SAP BusinessObjects Speaker: Kevin McManus Founder, LaunchWorks Learning Points Eliminate effort and delay of moving data to the cloud
Three Case Studies in Access Management
Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Mergers and Acquisitions: The Data Dimension
Global Excellence Mergers and Acquisitions: The Dimension A White Paper by Dr Walid el Abed CEO Trusted Intelligence Contents Preamble...............................................................3 The
A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities
A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities Numerous roles and responsibilities will need to be acceded to in order to make data warehouse
The Importance of Data Governance in Healthcare
WHITE PAPER The Importance of Data Governance in Healthcare By Bill Fleissner; Kamalakar Jasti; Joy Ales, MHA, An Encore Point of View October 2014 BSN, RN; Randy Thomas, FHIMSS AN ENCORE POINT OF VIEW
The State of Identity Management Self-assessment Questionnaire
Identity and the Cloud: Preparing Your Campus EDUCAUSE 2010 Pre-Conference Seminar The State of Identity Management Self-assessment Questionnaire Each entry below describes an aspect of identity management
Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners
Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
Information Management & Data Governance
Data governance is a means to define the policies, standards, and data management services to be employed by the organization. Information Management & Data Governance OVERVIEW A thorough Data Governance
Metadata Management as part of Data Governance and Data Stewardship at ebay, Inc. Mark Uksusman Sr. Manager, Enterprise Data Architecture, ebay, Inc.
Metadata Management as part of Data Governance and Data Stewardship at ebay, Inc. Mark Uksusman Sr. Manager, Enterprise Data Architecture, ebay, Inc. 50,000 Categories of Products on ebay.com Scale at
Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)
www.calstate.edu Common Financial System: Security Consultant Introduction The California State University (CSU), Office of the Chancellor seeks to identify a consulting partner for its Oracle Enterprise
Business Architecture: Scenarios & Use Cases
Business Architecture: Scenarios & Use Cases This white paper was developed as a result of OMG wiki postings between Dec. 2007 and March 2008. It presents a series of business architecture scenarios that
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
