- All
- Engineering
- Data Governance
Powered by AI and the LinkedIn community
1
Data encryption types
2
Data encryption standards
3
Data encryption keys
4
Data encryption risks
5
Data encryption benefits
6
Data encryption best practices
7
Here’s what else to consider
Data encryption is a vital component of data governance, as it protects sensitive and confidential information from unauthorized access, tampering, or theft. Encryption transforms data into an unreadable format using a secret key, making it impossible to decipher without the correct key. Data encryption principles are the guidelines and best practices that ensure effective and secure encryption for data governance. In this article, you will learn about the most important data encryption principles for data governance and how they can help you safeguard your data assets.
Key takeaways from this article
-
Key management:
Central to data governance is the secure management of encryption keys. Ensure they are generated randomly, stored securely away from the data, and rotated frequently to minimize risks of compromise.
-
Hardware-based encryption:
For efficiency, utilize hardware solutions for encryption tasks. This offloads the workload from your main server, allowing for seamless encryption with minimal impact on system performance.
This summary is powered by AI and these experts
- Yuvaraj Birari Top Voice Data Architect and Top Voice…
- William Bostic NASM-CPT, Retired IBMer
1 Data encryption types
There are two main types of data encryption: symmetric and asymmetric. Symmetric encryption uses the same key to encrypt and decrypt data, while asymmetric encryption uses a pair of keys: one public and one private. The public key can be shared with anyone, but the private key must be kept secret. Symmetric encryption is faster and simpler, but asymmetric encryption is more secure and flexible. Depending on your data governance needs, you may use one or both types of encryption for different purposes.
Help others by sharing more (125 characters min.)
-
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Data Encryption picked up post Cloud. Earlier Data was moving within Organizational on-premise infrastructure, rarely it would go outside. These rare occasion, Secure Transfer protocol was used frequently and encryption was optional. Now, Cloud infrastructure forced every data-interaction outside of Organizational physical boundaries. This nature of data interaction pattern mandates Encryption a must to have. The types, Symmetric and Asymmetric are dependent on nature of data interaction i.e. System-System and User-System, volume, speed, frequency, performance expectations etc. In my experience, the usage is mixed, between both Symmetric and Asymmetric types, for a given project or use case, depending on scenario.
LikeLike
Celebrate
Support
Love
Insightful
Funny
2
- Lindsay Pettai, CKM, A-CSM, CSPO 🏅 2x Top LinkedIn Voice | Data 📊 Governance Manager | Program Management | Project Management | Change Management PROSCI | Data Governance Leader | Senior Data Governance Manager | Data Governance Program Leader 📉
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
In practice, many organizations use a combination of both symmetric and asymmetric encryption to strike a balance between speed, security, and scalability. For example, symmetric encryption might be used to secure the contents of a confidential message, while asymmetric encryption ensures the secure exchange of the symmetric key.The key is to carefully assess your specific data security requirements and employ the appropriate encryption type or combination to meet those needs effectively. A layered approach to encryption can provide a robust defense against data breaches and unauthorized access, catering to various aspects of data governance and security.
LikeLike
Celebrate
Support
Love
Insightful
Funny
2 Data encryption standards
Data encryption standards are the specifications and protocols that define how encryption is performed and verified. They ensure that encryption is consistent, interoperable, and compliant with industry and regulatory requirements. Some of the most widely used data encryption standards are AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), and SSL/TLS (Secure Sockets Layer/Transport Layer Security). These standards provide different levels of security, performance, and functionality for encrypting data in transit and at rest.
Help others by sharing more (125 characters min.)
- Lindsay Pettai, CKM, A-CSM, CSPO 🏅 2x Top LinkedIn Voice | Data 📊 Governance Manager | Program Management | Project Management | Change Management PROSCI | Data Governance Leader | Senior Data Governance Manager | Data Governance Program Leader 📉
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
When you see "https://" in a website's URL, it signifies the use of SSL/TLS encryption, providing crucial online security and user trust.As data security and privacy have become paramount concerns in the digital age, SSL/TLS encryption is an example of a data encryption standard that has widespread implications for online security and user trust. It's used in a variety of online services, from e-commerce websites to online banking, and it plays a crucial role in safeguarding sensitive information during online interactions.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3 Data encryption keys
Data encryption keys are the secret codes that enable encryption and decryption of data. They are the core of data encryption and must be managed carefully and securely. Data encryption keys should be generated randomly, stored separately from the data, rotated regularly, and revoked when no longer needed. Data encryption keys should also be protected from unauthorized access, modification, or loss using encryption key management tools and policies. Data encryption key management is a critical aspect of data governance that ensures the availability, integrity, and confidentiality of encrypted data.
Help others by sharing more (125 characters min.)
- Lindsay Pettai, CKM, A-CSM, CSPO 🏅 2x Top LinkedIn Voice | Data 📊 Governance Manager | Program Management | Project Management | Change Management PROSCI | Data Governance Leader | Senior Data Governance Manager | Data Governance Program Leader 📉
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
In the data and knowledge management landscape, safeguarding data encryption keys is non-negotiable. These keys are the guardians of data security, ensuring confidentiality and integrity. Managing them with precision, randomness, and regular rotation is a cornerstone of effective data governance. Moreover, robust protection through encryption key management tools and policies is vital. It's not just about keeping data safe; it's about ensuring data is accessible when needed and impenetrable when not. In today's data-driven world, strong encryption key management is at the heart of responsible data stewardship.
LikeLike
Celebrate
Support
Love
Insightful
Funny
- Jessica Talisman 6x Top Voice, LinkedIn💡Building information systems for the benefit of all Taxonomy | Ontology | KG | InfoSci
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Utilizing UUIDs is a common encryption method used to locate and access data objects. UUIDs can also be used as part of an https or http structure to permalink an encrypted data object for secure access by users with access permissions.
LikeLike
Celebrate
Support
Love
Insightful
Funny
4 Data encryption risks
Data encryption risks are the potential threats and challenges that may compromise the effectiveness and security of encryption, such as weak or outdated algorithms, poor practices, key compromise or loss, overhead or performance issues, and compliance or compatibility issues. To mitigate these risks, it is important to follow data encryption principles, use reliable and updated encryption tools and methods, and monitor and audit encryption activities and outcomes.
Help others by sharing more (125 characters min.)
- Lindsay Pettai, CKM, A-CSM, CSPO 🏅 2x Top LinkedIn Voice | Data 📊 Governance Manager | Program Management | Project Management | Change Management PROSCI | Data Governance Leader | Senior Data Governance Manager | Data Governance Program Leader 📉
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Outdated algorithms and poor practices can create vulnerabilities that threaten data security. Key compromise or loss, performance overhead, and compliance or compatibility issues are challenges we must navigate.To tackle these risks effectively, a proactive approach is essential. We must adhere to encryption best practices, employing robust and up-to-date encryption methods and tools. Continuous monitoring and auditing are indispensable for staying one step ahead of potential threats. In a data-driven world, staying vigilant in data encryption is the linchpin of sound data and knowledge management practices.
LikeLike
Celebrate
Support
Love
Insightful
Funny
5 Data encryption benefits
Data encryption benefits are the positive outcomes and advantages that encryption provides for data governance. These include improved data security and privacy, data compliance and trust, and data value and innovation. To maximize these benefits, it is important to align encryption goals and strategies with data governance objectives and policies, as well as measure and communicate encryption value and impact. Encryption helps protect data from unauthorized access, disclosure or misuse, while also helping to comply with data protection laws and regulations. It also enables data sharing and collaboration, which can support data-driven decision making and innovation, ultimately building trust and reputation with customers and stakeholders.
Help others by sharing more (125 characters min.)
- Lindsay Pettai, CKM, A-CSM, CSPO 🏅 2x Top LinkedIn Voice | Data 📊 Governance Manager | Program Management | Project Management | Change Management PROSCI | Data Governance Leader | Senior Data Governance Manager | Data Governance Program Leader 📉
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
I see data encryption as an invaluable tool that aligns seamlessly with our core objectives. The benefits it brings, from enhanced security and privacy to bolstering compliance and trust, are the bedrock of responsible data governance. Encryption safeguards our data, ensuring it remains confidential and untampered. It fosters trust and collaboration by enabling secure data sharing, underpinning our data-driven decision-making processes and sparking innovation. These advantages, when harnessed correctly, are the building blocks of a strong reputation with our customers and stakeholders, paving the way for a brighter data management and knowledge management future.
LikeLike
Celebrate
Support
Love
Insightful
Funny
- Jessica Talisman 6x Top Voice, LinkedIn💡Building information systems for the benefit of all Taxonomy | Ontology | KG | InfoSci
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Data encryption can have a secondary value, to establish the existence of a defined entity or object as unique. The serialized encryption of data makes it easier to merge duplicates and map relationships between objects and entities represented in a data landsape.
LikeLike
Celebrate
Support
Love
Insightful
Funny
6 Data encryption best practices
Data encryption best practices are the recommendations and tips that can help you implement and maintain effective and secure encryption for data governance. To start, you should assess your data encryption needs and risks, and define your encryption scope and objectives. Then, choose the appropriate encryption types, standards, and tools for your data sources, formats, and uses. Additionally, manage and protect your encryption keys using encryption key management tools and policies. Moreover, monitor and audit your encryption activities and outcomes, while updating your encryption methods and standards as needed. Lastly, educate and train your data users and stakeholders on encryption principles and practices. By following these data encryption best practices, you can achieve data encryption excellence and enhance your data governance performance and maturity.
Help others by sharing more (125 characters min.)
- Stephen Solewin Corporate Solutions Architect at Infinidat
(edited)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Just a thought around encryption best practices, regarding host based encryption and data reduction in the storage. Make sure everyone is involved in decisions to use host based encryption. Encryption essentially is obscuring data and patterns in that data. Data reduction is essentially finding patterns and storing them more efficiently. If host based encryption is turned on, what used to be data that reduced at a good ratio becomes data that doesn't reduce at all! Make sure all the players are aware of these decisions so capacity planning can be done effectively.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3
7 Here’s what else to consider
This is a space to share examples, stories, or insights that don’t fit into any of the previous sections. What else would you like to add?
Help others by sharing more (125 characters min.)
- William Bostic NASM-CPT, Retired IBMer
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
My perspective is that encryption and compression go hand in hand. My view is that using server MIPS to accomplish encryption/compression is far more expensive than letting the storage solution handle it. Some storage solutions, like IBM FlashSystem, can do it for next to zero performance impact. Where it does make sense to do it on the server is mainly around managing main memory footprint, especially for in memory databases and AI corpus. In the best case, the encryption/compression is still handled with a hardware offload engine vs. burning CPU cycles.
LikeLike
Celebrate
Support
Love
Insightful
Funny
2
- Harry Yudenfriend IBM Fellow (retired)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
For IBM z and z/OS clients, host based compression and encryption is available for the vast majority of data accessed through IBM access methods and ISV products. FICON and FCP encryption of data in flight is available for 100% of the data flowing over fiber channel links for added protection of data against additional other exposures (i.e. insider attacks). Clients using zHyperLinks for 10x reduction in I/O latency for critical applications need to consider host bast encryption for also protecting data in flight (i.e. dB2 logs).
LikeLike
Celebrate
Support
Love
Insightful
Funny
2
- Stephen O'Brien
(edited)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
When it comes to key management some storage vendors support local onboard key management. You need to consider if this is sufficient versus using a key management platform which carries additional cost and possible overhead as it needs to be managed. Local onboard may be less expensive and easier to manage but is it as effective.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
-
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Effective data encryption is pivotal for safeguarding sensitive information, ensuring that only authorized parties can access it. Adhering to a robust encryption standard, like AES, is crucial for maintaining data integrity and confidentiality. Implementing end-to-end encryption ensures data is protected during transmission and at rest. Regularly updating cryptographic keys and employing a key management system enhance security. Lastly, compliance with global data protection regulations, like GDPR and upcoming India's own DPR Bill, is imperative to ensure lawful data handling and build customer trust.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
Data Governance
Data Governance
+ Follow
Rate this article
We created this article with the help of AI. What do you think of it?
It’s great It’s not so great
Thanks for your feedback
Your feedback is private. Like or react to bring the conversation to your network.
Tell us more
Tell us why you didn’t like this article.
If you think something in this article goes against our Professional Community Policies, please let us know.
We appreciate you letting us know. Though we’re unable to respond directly, your feedback helps us improve this experience for everyone.
If you think this goes against our Professional Community Policies, please let us know.
More articles on Data Governance
No more previous content
- You're faced with conflicting data governance policies. How do you harmonize them during system migrations? 2 contributions
- You're merging sensitive information post-acquisition. How can you safeguard against data security risks? 1 contribution
- You're striving for consistent communication on data governance. How can you engage remote teams effectively?
- You're facing data access requests beyond policy limits. How will you navigate this challenging situation? 3 contributions
- You're tasked with safeguarding sensitive data. How do you assure clients of the security measures in place? 1 contribution
- You're developing a client-facing application. How can you balance data security with user accessibility? 1 contribution
- Struggling to maintain data governance standards across diverse business units?
- You prioritize quick data access, but are you risking long-term security?
No more next content
Explore Other Skills
- Programming
- Web Development
- Machine Learning
- Software Development
- Computer Science
- Data Engineering
- Data Analytics
- Data Science
- Artificial Intelligence (AI)
- Cloud Computing
More relevant reading
- Data Governance How can you customize encryption settings for different users and data types?
- Data Governance How can you educate your team on data encryption methods?
- Data Management How can encryption improve your data backup strategy?
- Database Administration How can you search and sort encrypted data?