Package DataLifecycle
URI: DataLifecycle
Description: Model of data processing, movement and persistence.
        (empty)
An adverse behaviour of stored or flowing copies of data, signifying that the copy is not available in an unencrypted form. Considered an adverse effect because it can lead to loss of availability for the data if a legitimate user or process lacks a suitable decryption key, and used to model side effects of encryption controls. |
|
An adverse behaviour of stored or flowing copies of data, signifying that the copy is not available in an encrypted form. Considered as an adverse effect as it means confidentiality could be breached without compromising a decryption key, and used to model side effects of encryption controls. |
Process Process has a key for encrypting or decrypting data Data. |
|
The data Data flowing between processes FlowsFrom and FlowsTo is encrypted by the two processes (i.e. not relying on transport level encryption). |
|
The data Data sent by Process to FlowsTo is encrypted end-to-end (i.e. not relying on transport level encryption). |
|
The data Data sent by FlowsFrom to Process is encrypted end-to-end (i.e. not relying on transport level encryption). |
|
Makes it possible to check that a copy of Data flowing from FlowsFrom to FlowsTo has not been accidentially or deliberately altered by an intermediary or in transit. |
|
The data Data flowing between processes FlowsFrom and FlowsTo is encrypted end-to-end (i.e. not relying on transport level encryption), and FlowsTo has the key needed to decrypt the data on arrival. |
|
The data Data flowing between processesFlowsTo and FlowsTo is encrypted end-to-end (i.e. not relying on transport level encryption), and FlowsFrom has the key needed to encrypt the data for transmission. |
|
Process Service has a key for encrypting or decrypting data Data. |
|
The copy of Data stored on Host is encrypted. |
|
Makes it possible to check if the stored copy of Data on Host has been altered by an unauthorised process. |
|
The stored copy of Data is protected by creating multiple copies across a cluster of instances of Host. |
|
The flow of data Data from FlowsFrom to FlowsTo has been disabled. This control strategy represents a permanent restriction introduced by design, or a temporary situation created following activation of a contingency plan. In the latter case, this control strategy should not itself be selected, because its controls will be fulfilled by the contingency plan activation strategy. |
|
Processes Service and Client share data Data in encrypted form, but use keys to encrypt or decrypt between transfer and processing, implying a need for the keys used with Data to also be shared. |
|
Process Process uses homomorphic encryption technology to perform calculations on data Data in an encrypted domain, allowing it to process the data without first decrypting. |
|
Process Service uses homomorphic encryption technology to perform calculations on data Data in an encrypted domain, allowing it to process the data without first decrypting. |
|
Process Service uses homomorphic encryption technology to process queries on data Data in an encrypted domain, allowing it to serve the data without decrypting it. |
|
Database service Service stores data using Parquet format, enabling it to run queries by selective decryption of the stored data Data, whether this is done locally or at a remote data store. This imposes far less overheads, as the amount of data that must be decrypted is small. |
|
The flow of data Data from FlowsFrom to FlowsTo can be temporarily blocked by the manager ProcessManager of recipient process FlowsTo to prevent corrupt or malicious content (including malware) from disrupting the process. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
The flow of data Data from FlowsFrom to FlowsTo has been disabled by the manager ProcessManager of FlowsTo to prevent corrupt or malicious content (including malware) disrupting the process. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user ProcessManager who is responsible for managing process FlowsTo. The Disabled Data Flow control should be deselected only when the flow of data is enabled again. |
|
The flow of data Data from FlowsFrom to FlowsTo can be temporarily blocked by the manager ProcessManager of sending process FlowsFrom to prevent leaking of data. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it also triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated. |
|
The sending of data Data from FlowsFrom to FlowsTo has been disabled by the manager ProcessManager of FlowsFrom to prevent leaking of data. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user ProcessManager who is responsible for managing process FlowsFrom. The Disabled Data Flow control should be deselected only when the flow of data is enabled again. |
The process has a key for encrypting or decrypting data. |
|
The data flow has been disabled. This is not a contingency plan but a state reached after activation of a contingency plan. It should be selected in current risk calculations to determine the effect of disabling the data flow, or when runtime monitoring detects the data is not flowing. |
|
Applies to a data-process relationship (represented by a logical DataUse or DataPool asset), and signifies that the data is processed in the encrypted domain. |
|
Data is encrypted. This may apply to a stored or flowing copy of specific data. |
|
The data is cryptographically verifiable. This may apply to a specific stored or flowing copy of the data. If applied to the data asset to which these relate. For now, we assume the data is normally encrypted after insertion of an integrity check. Encryption ensures updates are by authorised processes (in possession of a key), and thus the signature can be self-signed inside the outermost encryption. This avoids the need to model extra measures such as X509 to bind the signature to the authorised process, although it does mean the model only corresponds to embedded integrity checking information. |
|
The stored data is encrypted using a Parquet encryption schema, minimising the amount of data that must be decrypted to process queries against the data. |
|
The stored data is replicated, so the asset represents multiple copies providing protection against loss of integrity or availablity due to erroneous or malicious alteration (including encryption) or deletion. |
|
Signifies that a data flow can be blocked if it is corrupt, preventing it from being consumed by the destination process. Used in contingency plan strategies to disable a data flow when it poses a danger to the process. |
|
Signifies that a data flow can be blocked at the source process, preventing it being sent by that process. Used in strategies where there is a risk that the data may be compromised or where sending the data may breach compliance with regulations. |
|
Signifies that a data flow can be blocked by the sender if it is sensitive, preventing it from being consumed by the destination process. Used in contingency plan strategies to disable a data flow when the destination process may not be trustworthy. |
A data access asset associated with a source process. |
|
A data access asset associated with a destination process. |
|
A data access role. |
|
A data asset role fulfilled by any serialised copy of data (i.e. data copy or data flow). |
|
A stored data copy created as a data flow cache. |
|
A data copy role. |
|
A data access asset associated with a destination process. |
|
A flow of data between processes. |
|
A data access role associated with data consumed by a process. |
|
A data access role associated with data produced by a process. |
|
A data access role associated with data served by a process. |
|
A data access role associated with data used by a process. |
|
A data access role associated with data forwarding by a process. |
|
A data access asset associated with a source process. |
|
A process-to-process data movement, forming one step in a data flow. |
|
A data access asset associated with data consumed and altered by a process. |
|
A data access role associated with data used by a process. |
|
A process from which data is flowing. |
|
A process that is the destination for an outbound data flow. |
|
A process to which data is flowing. |
|
A data flow to a process. |
|
A Data Asset that is inbound to a process. |
|
A data step to a process. |
|
A data flow from a process. |
|
A Data Asset that is outbound from a Process. |
|
A data step from a process. |
|
A DataAccess asset relating to a remote access client used to enable user interaction with a remote process. |
|
A process from which data is transferred. |
|
A process to which data is transferred. |
|
Fulfilled by a process playing the role of key vault in relation to some data asset. |
Represents access to Data by a Process, including (in principle) the choice of which data instance(s) to serve or process. |
|
A base class for all assets representing Data. Used partly to provide a classifier for the palette. |
|
Represents a stored copy of data, which may or may not be persistent. Class name reflects the fact that the copy may be a cached data flow, created by a process if it cannot send data when produced as output, or cannot use data as input when it is received. A persistent stored copy is represented by subclass DataCopy. |
|
A common parent class for any asset that contains data, including assets that represent stored or flowing data, and assets such as IoT Things that incorporate embedded data. |
|
Represents a copy of data stored in persistent memory on a device. |
|
Represents an end to end flow of data between processes via a set of Data Steps connecting between intermediate processes. |
|
A base class for any assets used only to model state created by data lifecycle inference patterns. |
|
A subclass of DataUse relating to a process that uses data as an input. |
|
A subclass of DataUse relating to a process that creates data as an output. |
|
Overlay parent class representing data loaded by a process, in which the process acts as an enabler for data access by other processes, either as a data source or as a server of stored data. |
|
A subclass of DataUse relating to a process that uses data as an input or produces it as output (i.e. data processing as opposed to data serving or data transfer). |
|
A subclass of DataAccess relating to a process that serves data as an intermediary, without storing it locally (except possibly in a cache). As such, the process acts as both a producer and a consumer in flows of this data. |
|
Represents the exchange of data between interacting processes (or their ability to securely exchange data). |
|
A subclass of DataUse relating to a process that uses data as both an input and an output. |
|
An overlay parent class covering all DataAccess assets that represent the production or consumption of data in data flows. This excludes processes that only serve data. |
|
A subclass of DataUse relating to a process that reads locally stored data and also supplies the data for use by other processes. |
|
A subclass of DataUse relating to a process that creates data and also supplies the results for use by other processes. |
|
A subclass of DataAccess relating to a remote access client used to interact with a process on another host. In this situation, the remote access client never holds a complete copy of the data in its memory, but it does participate in the data flow between its user and the remote process. |
|
Represents stored data loaded by a process, in which the process acts as an enabler for access by other processes, i.e. a server of stored data. |
|
A subclass of DataAccess relating to a process that serves data as an intermediary, without storing it locally (except possibly in a cache). This subclass is used where the process is not a DB process, implying there is no query processing and data is simply fetched and forwarded. |
|
A subclass of DataUse relating to a process that updates data and also supplies the results for use by other processes. |
An attribute of stored or flowing copies of data, signifying that the data is accessible in unencrypted form. Considered a trustworthiness attribute as it precludes loss of availability where a process lacks a suitable decryption key, and used to model side effects of encryption controls. |
|
An attribute of stored or flowing copies of data, signifying that the data is accessible in encrypted form. Considered a trustworthiness attribute as it prevents loss of confidentiality unless the key is compromised, and used to model side effects of encryption controls. |