The data lifecycle is a useful tool to understand all of the stages data goes through. This can include: what is collected; how it is collected; why it is collected; how and where it is stored and its pathway to destruction.
Models
Mather, Kumaraswarmy & Latif
This model assumes that data is used immediately and stored only for compliance and auditing.
Stage | Description | How to secure |
Generation | This is when data is created. | Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption. |
Use | The data is used for its purpose. This is data-in-use. | Access control.Follow the Essential Eight for any systems or computers used. |
Transfer | This is known as data-in-motion, data-in-flight or data-in-transit. It is data that is being moved around. | Data in motion is susceptible to Man in the Middle attacks, so encryption is needed for security. |
Transformation | Data is prepared for storage. This is data-in-use. | Access control.Follow the Essential Eight for any systems or computers used. |
Storage | Stored for later reference. This is data-at-rest. | Encryption and access control. |
Archival | Archived for compliance purposes. This is data-at-rest. | Encryption and access control. |
Destruction | Data is destroyed. | Access control.Follow the Essential Eight for any systems or computers used. |
AWS
This is a high level model. It is open to interpretation and can be customized for different uses. It is a circular process and data reuse is intrinsic in it’s design.
Stage | Description | How to secure |
Create/Ingest | This is when data enters the model. It may or may not be at the same time as it is created. | Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption. |
Store | Data is stored for use. This is data at rest. | Encryption and access control. |
Process | Data is processed ready for analysis | Access control.Follow the Essential Eight for any systems or computers used. |
Analyse | This is where we gain insights from the data. This is data-in-use. | Access control.Follow the Essential Eight for any systems or computers used |
Archive/retire | Data is stored and not altered. It may be used as a source of processed data in the future. This is data-at-rest. | Encryption and access control. |
Data Document Initiative (DDI)
The DDI has two loops, one for repurposing analysed data and the other for reusing archived data.
Stage | Description | How to secure |
Data Collection | This is when data is collected. It may or may not be at the same time as it is created. | Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption. |
Data Processing | Data is processed ready for archiving or further use. This is known as data-in-use | Access control.Follow the Essential Eight for any systems or computers used. |
Data Archiving | Data is stored and not altered. It may be used as a source of processed data in the future. This is data-at-rest. | Encryption and access control. |
Data Distribution | This is known as data-in-motion, data-in-flight or data-in-transit. It is data that is being moved around. | Data in motion is susceptible to Man in the Middle attacks, so encryption is needed for security. |
Data Discovery | Finding what you want or need within the data for your specific purpose. This is data-in-use. | Access control.Follow the Essential Eight for any systems or computers used |
Data Analysis | This is where we gain insights from the data. This is data-in-use. | Access control.Follow the Essential Eight for any systems or computers used |