So, you’ve recently learned about what Test Data Management is and why it’s amazingly valuable. Then, you’ve decided to start a TDM process at your organization. You’ve read about what Data Management includes, learned how TDM works, and finally went on to start implementing your Test Data Management strategy. But then you got stuck, right at the start. You’ve got a question for which you don’t have an answer: how to organize a Test Data Management team?
Well, fear no more, because that’s precisely what today’s post is about.
We start with a brief overview of Test Data Management itself. Feel free to skip, though, if you’re already familiar with the concept. We won’t judge you for that; we’re just that nice.
Continue reading “How to Organize a Test Data Management Team”
This post aims to answer a simple question. Namely, what is data provisioning in the context of Test Data Management (TDM.)
Socrata’s glossary of technical terms defines data provisioning as:
The process of making data available in an orderly and secure way to users, application developers, and applications that need it.
But remember what we want here is to understand what data provisioning is in TDM. While the question itself is—seemingly—simple, you’ll see that it can quickly generate a lot of other questions that need answering if we are to see the big picture.
We start by taking a look at the current state of affairs in the software development world. You’ll understand why applying automation to the software development process is vital for modern organizations and what roles the automated testing plays in this scenario.
We then give an overview of TDM. You’ll learn what Test Data Management is and why it is essential for a healthy testing strategy.
With all of that out of the way, it’ll be time for the main section of the post, where we’ll see what data provisioning is and how it fits into the TDM puzzle.
Let’s get started.
Continue reading “What Is Data Provisioning in Test Data Management?”
When you develop a data security architecture and strategy for your organization, your main objective is to protect the organization’s data.
To do that, you first need to identify all threats and vulnerabilities associated with that data and inform the business about the security risks you identified. Next, you need to introduce appropriate countermeasures to manage those risks based on the risk appetite of the organization. To do that successfully, you need data security controls and you need to have a firm grasp on what the primary objective of data security control is. Today, I want to help by answering these questions in this post.
First, we’ll cover the definition of data security controls, what their main goal is, and why understanding security control objectives are important. Then, we’ll review the seven main security control types and their primary objectives. Following that, we’ll dive into security control categories that allow us to further define these controls. Let’s start by first defining data security controls.
Continue reading “What Is the Primary Objective of Data Security Controls?”