In our previous post, we discussed how the data value chain can be understood using the Fibonacci spiral. The data supply chain is important for planning security as it allows organizations to implement a security zoning model (more on that below) based around the relative importance as well as the data sensitivity of particular data systems. And security is a particularly important concern when planning a cloud migration as organizations need to strike the right balance between securing their data and at the same time, enabling the high value digital business models, which need data to be enabling democratic use, to serve the business eco-system. Creating economic value with data in the digital age, is a non-negotiable need. This is why there is a need to adequately secure and control data in the cloud. This is why, a fundamental step is to choose a cloud host who can ensure the security and reliability of sensitive, revenue-producing data – if at all you want to migrate it.
Security zoning model
Fig 1 : Inbound – Data Supply Chain
Fig 2 : Outbound – Information Supply Chain
In the images above, data is categorized by zone, which tells you about the data’s value and sensitivity based on its relative importance to the organization. Data that increases in value also becomes increasingly sensitive to a breach, and the closer it is to the center of the spiral. This relative value is demonstrated in the image below. The relative enterprise value of any application or data system can be accurately determined using tools such as the The Data As An Asset (DAAS) Index.
Fig 3 : Value VS Sensitivity to Data Breach
Data in Zone 0 is the most valuable to the organization and most susceptible to data breaches. As this data has the most value, it should be considered carefully during cloud migration. And if you want to make the move to the cloud, you will need to consider the following:
- What’s critical and what can be migrated and when?
- Some of your team’s day-to-day security tasks will be taken over by your cloud provider. Clearly defining security responsibilities and ensuring that your team continues adopting a proactive stance towards security becomes necessary. A detailed process flow complemented by a Responsible Accountable Consult Inform (RASCI) are practical tools available to most organizations.
- To be on the safe side, you could consider migrating non-critical data and applications so that issues don’t have a major impact. For instance, you can start with your data archives first and move some of the more important data when you’re happy with the performance and security of your migration.
With a solid data strategy and a well-managed data value chain, organizations can confidently identify the most valuable and sensitive data. In today’s age of unabated digital disruption, it has become imperative for organizations to understand their data deeply and create a strategy compatible with their business model. As a digital disruptor, cloud migration can be successful only if a thoughtful, effective data strategy is in place. And the big data and business analytics of the organization can be aptly supported by making the most of a scalable, cost-effective cloud infrastructure.
Enjoy your cloud!