Background Data Governance is often on top of the Chief Data Officer’s agenda. With the advent of the General Data Protection Regulation (GDPR) in Europe, the California Consumer Privacy Act (CCPA), the China Personal Information Protection Law (CPIPL) and others, companies are taking a closer look at their data practices. Beyond the need for regulatory […]
Cloud-Native Platforms are a Gartner Tech Trend at Last
It’s great to see cloud-native platforms finally listed as one of Gartner’s Top Strategic Technology Trends for the year ahead. This indicates that cloud use is maturing, with organisations gaining a clearer understanding of how to leverage its benefits. Every year, Gartner pinpoints the key trends it expects to act as ‘force multipliers’ of digital […]
Read More… from Cloud-Native Platforms are a Gartner Tech Trend at Last
Event Storming
Event Storming is a workshop-based approach to migrating a monolithic application to a microservices architecture. It follows a series of steps to assess the monolith, discover events, and identify actors who use the system. The final step of grouping these insights will help to inform an effective event-driven microservices architecture. The rise of Microservices has […]
Protecting Personal Data in Serverless Cloud
Introduction In our previous blog post, we learned about Personally Identifiable Information (PII), and the additional regulatory requirements that it carries. We covered three common requirements of PII regulation: Tracking Access; which talks about being able to audit who is accessing sensitive data, when they access it and where they access it. Protecting Data; which […]
Read More… from Protecting Personal Data in Serverless Cloud
Personally Identifiable Information in Regulated Organisations
Introduction Over the last few years, we have seen more enterprises open to adopting public cloud and migrating at least some of their data sets. Understanding how data can be protected in the cloud is a common question from teams less familiar with this technology. In this two-part blog post, we will first build an […]
Read More… from Personally Identifiable Information in Regulated Organisations
How Landing Zones Make Cloud Adoption Fast, Secure And Simple
Introduction Cloud adoption can be really hard to get right. It brings a host of challenges, complexities and risks that need to be carefully managed to ensure the many benefits of cloud computing are realised. Landing zones offer an effective way to simplify and de-risk cloud adoption. They give developers a pre-configured foundation to build […]
Read More… from How Landing Zones Make Cloud Adoption Fast, Secure And Simple
Serverless in the Finance Industry
Introduction With a shift towards modern development practices, services architecture has become a goal for many of our heavily regulated and security conscious clients. As the shift towards cloud computing increases many clients are striving to understand the challenges and opportunities that a Serverless approach provides while defining what a scaled cloud implementation means for […]
Introduction to Serverless Architecture
Introduction Is ‘Serverless’ just a new buzzword or is it a way to considerably reduce cloud operational cost for suitable applications? In this blog post, we provide an introduction to Serverless to help you determine whether it is relevant to your organisation. What Is Serverless Architecture? Simply put, Serverless architecture is a way to build […]
Walkthrough of the Singapore Personal Data Protection Act 2021 Update
Introduction The Personal Data Protection Act (PDPA) is Singapore’s data privacy regulation. In this blog post, we look at some of the differences between PDPA and European Union’s General Data Protection Regulation (GDPR), and the general perception and applicability of PDPA. Privacy regulation tends to be a secondary consideration for many organisations dealing with the […]
Read More… from Walkthrough of the Singapore Personal Data Protection Act 2021 Update
Forging Organisational Cloud Compliance at Scale with AWS
Introduction When large and highly regulated organisations shift workloads to the cloud, these environments come laden with requirements for robust oversight. Stakeholders have a ‘zealous’ focus on the requisite governance models, security infrastructure, and risk controls being associated with the cloud. At Sourced, we work closely with these organisations to meet these challenges and deploy robust frameworks to meet these requirements and mitigate risks – all while using AWS-available tools. In this blog, Sourced consultants walk you […]
Read More… from Forging Organisational Cloud Compliance at Scale with AWS