Datalign is a modular cloud-based Data Governance Platform (DGP) that is designed to give organisations with large and diverse data assets, better control and better visibility over what data they have.
Datalign allows users to register data terminals which are simply places that data are stored in the organisation. From the enterprise data warehouse to the network shared folder, all of these are data terminals.
Registering terminals give data managers a top down view of all of the data in an organisation
Some terminals can be automatically discovered and described by crawlers
Providers are external users who can provide data via the API or through the user interface
Additional security is provided to protect providers from inadvertently sharing data or from accessing the datasets of other providers without authority.
Providers are an additional mechanism for organising data within a domain.
Supsciptions allow users to sign up to receive emails for application events relating to topics that are or interest to them.
Users can add filters to limit the notification conditions to meet their needs.
External parties can also subscribe to matters such as the status of their applications, so that they are automatically informed when things change or decisions are made
Permissions control access to all of the features of the system.
Permissions are broken down to the smallest logical function, allowing the construction of tailored roles, including the ability to view only or to edit various input fields.
Multifactor Authentication (MFA) using a temporary security code sent via SMS when a user attempts to log into the system is enabled by default on all Datalign based systems.
This is one of a number of security updates implemented by Combase on the way to achieving its IRAP assessments.
Security is a primary concern of the solution and one of the main reasons for the adoption of the Datalign framework.
By ensuring that modules are deployed automatically using audited scripts and templates, programmer errors are largely eliminated and security monitoring is automatically activated.
Access to repositories is limited by default and needs to be explicitly granted.
Security events are logged and monitored at a system level.
The system API is protected by the AWS API Gateway
Data uploaded into the system will be automatically retained when new datasets are uploaded, ensuring that old versions are always available if necessary