Introducing the security and privacy requirements
How do you go about designing for the security and privacy of data? Well, let's take an example and try to walk through some scenarios. Let's consider our faithful Imaginary Airport Cabs (IAC) example that we used in our previous chapters. We have already seen that the cab company gets a lot of trips, customers, and driver information streaming in. We have also learned how to store the data in the data lake and SQL stores. Now, let's get a little deeper into the storage topic and figure out how to safeguard confidential and private information.
Let's consider the following requirements from the IAC security team:
- Data needs to be stored and transferred securely as we are dealing with cloud systems, and no one other than the IAC employees should have access to the data.
- Changes to data and any activity on the data should be recorded for compliance reasons.
- Not everyone should have access to all...