ABSTRACT

This chapter focuses on the high level picture of integrating IT governance with data protection, namely: architecture, service transition and change management. Recovery exists in a data protection model because of random chance, malicious actors, and the unpredictability of service consumers. The other forms of protection deal with situations where there’s still at least one on-platform copy of the data available, in some form or another; recovery is effectively what happens when the number of on-platform (or accessible on-platform) copies reduces to zero. The architecture of an environment, both the design and planning on the technical and business front, is crucial to the long-term viability of that environment. Just as there are specialist architectural roles in IT for networking, for messaging, for enterprise identification, and a plethora of other subjects, there is a clear need for specialist data protection architects.