Cyber Security

Luke Hally

Data lifecycles

October 27, 2021
Tags:

The data lifecycle is a useful tool to understand all of the stages data goes through. This can include: what is collected; how it is collected; why it is collected; how and where it is stored and its pathway to destruction.

Models

Mather, Kumaraswarmy & Latif

This model assumes that data is used immediately and stored only for compliance and auditing.

Data lifecycle (Mather, Kumaraswamy & Latif 2009)
StageDescriptionHow to secure
GenerationThis is when data is created.Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption.
UseThe data is used for its purpose. This is data-in-use.Access control.Follow the Essential Eight for any systems or computers used.
TransferThis is known as data-in-motion, data-in-flight or data-in-transit. It is data that is being moved around.Data in motion is susceptible to Man in the Middle attacks, so encryption is needed for security.
TransformationData is prepared for storage. This is data-in-use.Access control.Follow the Essential Eight for any systems or computers used.
StorageStored for later reference. This is data-at-rest.Encryption and access control.
ArchivalArchived for compliance purposes. This is data-at-rest.Encryption and access control.
DestructionData is destroyed.Access control.Follow the Essential Eight for any systems or computers used.

AWS

This is a high level model. It is open to interpretation and can be customized for different uses. It is a circular process and data reuse is intrinsic in it’s design.

AWS Data lifecycle
StageDescriptionHow to secure
Create/IngestThis is when data enters the model. It may or may not be at the same time as it is created.Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption.
StoreData is stored for use. This is data at rest.Encryption and access control.
ProcessData is processed ready for analysisAccess control.Follow the Essential Eight for any systems or computers used.
AnalyseThis is where we gain insights from the data. This is data-in-use.Access control.Follow the Essential Eight for any systems or computers used
Archive/retireData is stored and not altered. It may be used as a source of processed data in the future. This is data-at-rest.Encryption and access control.

Data Document Initiative (DDI)

The DDI has two loops, one for repurposing analysed data and the other for reusing archived data.

The Data Documentation Initiative (DDI) Lifecycle
StageDescriptionHow to secure
Data CollectionThis is when data is collected. It may or may not be at the same time as it is created.Structure the data – this will make it easier to process and assess. Lessen chance of secure data being dropped into a ‘look at it later’ category.Encryption.
Data ProcessingData is processed ready for archiving or further use. This is known as data-in-useAccess control.Follow the Essential Eight for any systems or computers used.
Data ArchivingData is stored and not altered. It may be used as a source of processed data in the future. This is data-at-rest.Encryption and access control.
Data DistributionThis is known as data-in-motion, data-in-flight or data-in-transit. It is data that is being moved around.Data in motion is susceptible to Man in the Middle attacks, so encryption is needed for security.
Data DiscoveryFinding what you want or need within the data for your specific purpose. This is data-in-use.Access control.Follow the Essential Eight for any systems or computers used
Data AnalysisThis is where we gain insights from the data. This is data-in-use.Access control.Follow the Essential Eight for any systems or computers used

Recent posts