What is a Data Mesh Architecture and How Does it Work?
Despite our increasing familiarity with data mesh as a concept, the diversity of stakeholders in the data mesh journey means there is still a bottleneck...
With Immuta’s attribute-based access controls (ABAC), policies are dynamically enforced on queries in Starburst. This protects sensitive data with row-, column-, and cell-level data protection, without having to make copies. Now, you can have fine-grained access control over sensitive data while reducing risk from data leaks or non-compliance with organizational policies.
New and expanding government regulations such as CCPA and the GDPR prevent analytics teams from legally using sensitive data without clear and intended purposes. Immuta provides easy-to-use consent workflows for data teams to audit usage purposes and create attribute-based controls that enforce who can use what data and why.
Immuta’s sensitive data detection feature automates the discovery and classification of sensitive attributes across your Starburst instance, helping to save time and eliminate risk from manual errors. After registering data sources with Immuta, data teams can automatically classify and tag direct, indirect, and sensitive identifiers.
Despite our increasing familiarity with data mesh as a concept, the diversity of stakeholders in the data mesh journey means there is still a bottleneck...
A data mesh is a relatively new data platform architecture that moves away from the...
As market demand for data mesh has grown, the need for dynamic attribute-based access control (ABAC) on Starburst’s popular data mesh...
Gone are the days of forcing users to go through a single catalog to control access. With the arrival of Starburst's System Access Control, Immuta is able to enforce access control and security policies at the object level, without requiring users to switch catalogs.
Watch HereGone are the days when data use was limited in scope – today’s increasingly decentralized data initiatives and architectures require decentralized access management.
Read More