Enabling Data Security and Governance
In the preceding chapters, we learned how to evaluate requirements and analyze and apply various architectural patterns to solve both real-time and batch-based problems. We learned how to choose the optimal technical stack and develop, deploy, and execute the proposed solution. We also discussed various popular architectural patterns for data ingestion. However, any discussion about data architecture is incomplete without mentioning data governance and data security. In this chapter, we will focus on understanding and applying data governance and security in the data layer.
In this chapter, we will first discuss what data governance is, and why it is so important. We will also briefly discuss a few open source data governance tools that are available on the market. Then, we will practically demonstrate a data governance implementation by adding a data governance layer to a data ingestion pipeline. The data ingestion pipeline ID will be developed...