Data Governance Maturity Guideline EN
Data Governance Maturity Guideline EN
Maturity Guideline
for Telecommunication and
Information Technology Sector
Version 3
Table of Contents
Introduction 3
Framework Structure 5
Governance Domains 9
Glossary 21
Appendix 22
2
Introduction
Based on the Communications and Information Technology Act issued by Royal Decree No.
(M/106) dated 02/11/1443 AH, and it’s Bylaw, and based on the regulatory tasks assigned to CST
under its Ordinance, CST prepared this document titled “Data Governance Maturity Guideline for
Service Providers Regulated by CST”.
This framework is a self-assessment framework for service providers regulated by CST in order
for them to improve their data governance practices and digital capabilities, as well as increasing
their data protection standards and reducing data related risks. This framework contains a maturity
assessment model which consists of nineteen subdomains, each with multiple levels of maturity
defined and best practices explained for each sub-domain.
This framework is limited to the data governance and management topics such as data storage,
data classification, data strategy, data security, data infrastructure, etc. which are enablers to the
effective usage of data in an organization, often managed by either the Chief Data Officer’s (or
equivalent) team and it does not aim to provide any guidance outside of this defined scope.
3
1-1 Purpose of this Framework
CST shall update this framework in the future when changes are deemed necessary either due
to changing regulatory environments, adapting to changes in technologies, or changes in best
practices.
Determine Maturity level by using the templates provided in the appendix by filling in the maturity
level for each sub-domain for each domain then multiplying with the modifier to calculate the
maturity score for each domain and then use the domain scores to calculate the final overall
maturity score.
Capture Value from the assessment by implementing the actions and recommendations
communicated in the report in step 4. After implementing these actions, it is recommended
to conduct the self-assessment again on a regular basis using the latest version of this Data
Governance Maturity Framework.
4
Framework Structure
The Data Governance Maturity Framework with its four domains - Data Aspiration, Technology
and Data Architecture, Data Operating Model and Culture and Risk - forms the basis for all service
providers to assess their data governance maturity.
Data Aspiration Technology And Data Data Operating Model Culture And Risk
Architecture
Data Management Vision and Data Architecture Data Governance, Ownership Talent, Skills and Capabilities
Strategy and Quality
Data Sharing, Integration and Data Culture
Data Management Roadmap Interoperability Data Operations and
Data Ethics and Risks
Data Product Processes
Data Modelling and Design
Data Ecosystem Personal Data Protection
Data Classification
Data Management Tooling
Data Value Realization Data Control Environment
Reference and Master Data
Management
5
The Data Aspiration domain contains five sub-domains, the Technology and Data Architecture
domain has four sub-domains, Data Operating Model is split into five sub-domains and Culture
and Risk has five sub-domains.
The data governance maturity model has five maturity levels from 1 to 5 for each sub-domain
under each domain detailed in the next section. In order to achieve a higher maturity level, the
service provider must first meet the requirements of all preceding levels.
Broadly, any service provider can interpret the maturity levels for each sub-domain as given below.
Value for
Maturity Level Description
Calculation
Service provider has not taken any action yet for this sub-domain and can be considered to be nascent;
Nascent 1
it may or may not plan to take action for this sub-domain at the moment
Service provider has taken a few actions for this sub-domain but it is not considered a fundamental
Experimenting 2 part of the service provider's business strategy; benefits from the actions taken have not been realized
at this point
Service provider has taken several actions for this sub-domain and is slowly becoming a fundamental
Maturing 3 part of the service provider's business strategy; benefits from actions taken may or may not have been
realized and the service provider is planning to scale up these actions
Service provider is implementing best practices for this sub-domain and it is a fundamental part of
Mature 4 the business strategy; these best practices have led to benefits at scale and has led to an overall
improvement in the service provider's abilities
Service provider is using best practices and is innovating in this sub-domain to be ahead of its
peers; the service provider may be testing new technologies, processes, approaches and is generally
Leader 5
considered as the benchmark for best-in-class in this particular sub-domain in its sector. Overall, the
service provider follows an integrated and consistent approach across the whole organisation.
6
2-2 Structure
The key shown below explains how to interpret the tables that contains information provided each
sub-domain and domain in the next section.
Option #1
GD.X.1 XXXX
GD.X.2 XXXX
GD.X.3 XXXX
… …
The numbering format for the domain is GD.X where GD stands for 'Governance Domain'
1 Domain Code
e.g., the first domain will be labelled GD.1
The numbering format for the sub-domain is GD.X.X where the first number indicates the domain
number the second number indicates the sub-domain number
4 Sub-Domain Code
e.g., the second sub-domain for first domain will be labelled GD.1.2
7
3-3 Sub-Domain Structure
Version
Sub-Domain Best-in-class
XXXX
Practices
1 XXXX
2 XXXX
3 XXXX
… …
The numbering format for the domain is GD.X where GD stands for 'Governance Domain'
1 Domain Code
e.g., the first domain will be labelled GD.1
The numbering format for the sub-domain is GD.X.X where the first number indicates the domain
number the second number indicates the sub-domain number
3 Sub-Domain Code
e.g., the second sub-domain for the first domain will be labelled GD.1.2
Sub-Domain Best-in-class
Explanation of the best practices that service providers can follow
Practices
Description of the maturity level for the sub-domain including activities being conducted by the
8 Maturity Level Description
service provider in order to be classified as having obtained that particular level of opportunity
8
Governance Domains
Data Aspiration Technology And Data Data Operating Model Culture And Risk
Architecture
Data Management Vision and Data Architecture Data Governance, Ownership Talent, Skills and Capabilities
Strategy and Quality
Data Sharing, Integration and Data Culture
Data Management Roadmap Interoperability Data Operations and
Data Ethics and Risks
Data Product Processes
Data Modelling and Design
Data Ecosystem Personal Data Protection
Data Classification
Data Management Tooling
Data Value Realization Data Control Environment
Reference and Master Data
Management
This domain covers the strategic activities that shape the overall data governance and management strategy of the service
provider, including the business model of potential services, products and alliances that a service provider might build as
well as actions it can take to ensure effective implementation of its strategies.
Sub-Domain Sub-Domain
Code
GD.3-1-1 Data Management Vision and Strategy
GD.3-1-2 Data Management Roadmap
GD.3-1-3 Data Product
GD.3-1-4 Data Ecosystem
GD.3-1-5 Data Value Realization
9
3 Service provider is implementing a set of initiatives which are part of the data governance and management vision
and strategy such as defining policies, standards, delegating responsibilities, etc. but has not yet experienced the
benefits from it
4 Service provider is implementing a significant set of initiatives as part of a wider data management vision and
strategy and outcomes from these initiatives are resulting in some early benefits that are helping the service
provider to improve its data-related goals
5 Service provider has delivered a significant batch of initiatives as part of a defined and incorporated data
management vision and strategy, reviews initiative impacts and iteratively implements new initiatives when
required by the broader data aspirations of the organization
10
3-1-4 Data Ecosystem
Version 1
Data ecosystems are platforms that combine data from numerous providers and build value for all entities who have
Sub-Domain access to the data on that platform. Data platforms allow organizations access to resources that traditionally they
Description would not have been able to use, hence allowing them to create new data-enabled products and services. Often,
associations of organizations as well as government authorities can help in the creation of these ecosystems.
Sub-Domain Best-in- Having strategic partnerships with multiple players, well-defined infrastructure for data sharing and common
class Practices standards for data in place.
1 Service provider is not aware of data ecosystems and has not participated in one
Service provider has started exploring options such as the creation of or participation in data ecosystems but
2
without a definite plan in place
Service provider is planning to either launch or join a data ecosystem in the next 12 months and is in the process
3
of shortlisting its options
Service provider has identified specific data ecosystems or stakeholder that it wants to build an ecosystem with
4
and are currently in the course of joining it
Service provider has already been leveraging data ecosystems in collaboration with other stakeholders and has
5 realized the benefits from it, e.g., access to new data from another stakeholder has led to improvements in the
service provider's existing products or services
Data value realization involves the continuous evaluation of data assets for potential data driven use cases that
generate revenue or reduce operating costs for the service provider. By understanding the value of data, often
Sub-Domain
by building hypothetical use cases and sizing the value of these use cases, service providers can effectively build
Description
business cases using data and identify the technical and organizational target state necessary to achieve desired
outcomes.
Having a close collaboration between teams from the business and analytics departments in order to scope, build,
Sub-Domain Best-in-
deploy and maintain impactful data-enabled use cases, with identified profit and loss scenarios and a robust
class Practices
governance mechanism in place to intervene if use cases do not perform as expected according to critical KPIs.
Service provider does not see data as a value-generating asset and mostly uses it for reporting and operational
1
purposes
Service provider has started viewing data as a strategic asset and the first initiatives have been identified and
2
owners assigned
Service provider is implementing data-enabled use cases across business divisions with proper owners identified
3
and their return on investments calculated
Service provider has implemented several data-enabled use cases which are regularly tracked for their performance
4 including profit, loss, malfunctions etc. and internal use cases now support several business decisions but manual
intervention is often required
Service provider has implemented several data-enabled use cases whose value generated is constantly tracked
5 with proper governance in place if interventions are required and business decisions are now driven by mature and
effective internal use cases that rarely require manual inputs
11
GD.3-2 Technology and Data Architecture
Data Management Vision and Data Architecture Data Governance, Ownership Talent, Skills and Capabilities
Strategy and Quality
Data Sharing, Integration and Data Culture
Data Management Roadmap Interoperability Data Operations and
Data Ethics and Risks
Data Product Processes
Data Modelling and Design
Data Ecosystem Personal Data Protection
Data Classification
Data Management Tooling
Data Value Realization Data Control Environment
Reference and Master Data
Management
Service providers need to ensure that proper tools, technologies, systems and standards are in place in order to
store, analyze and transform data to realize value from it. Investing in the right technologies means that service
Governance Domain
providers can manage their data more efficiently, build more accurate advanced analytics-enabled models,
Description
provide the latest tools to employees so they can work efficiently with data and make it easier to integrate with
external resources with proper interoperability standards baked in.
The Data Architecture of an organization or service provider describes how data is stored, managed and integrated
Sub-Domain with different systems through specific rules, systems and models to support the business strategy. A well-
Description designed data architecture makes it easier for data users to build data pipelines, conduct transformations or
identify data lineage for any data products or use cases they would like to build.
Sub-Domain Best-in- Having an end-to-end consistency, covering all layers of data transformation that most data owned by an
class Practices enterprise would go through from its source to aggregation, cleaning, storage to the end user or products.
2 Service provider has defined a data architecture for certain processes or business units
Service provider has defined a data architecture for almost all relevant processes but the architecture does not
3 cover all layers of transformation (sourcing, storage, aggregation, manipulation, presentation, etc.) and does not
provide a view on data flows and data lineage
Service provider has defined a data architecture for all relevant processes but the architecture does not cover
4 all layers of transformation (sourcing, storage, aggregation, manipulation, presentation etc.) and provides an
incomplete view on data flows and data lineage
Service provider has defined a data architecture for all relevant processes which covers all layers of transformation
5 (sourcing, storage, aggregation, manipulation, presentation etc.) and provides detailed information on the data
flows, data lineage and the service provider regularly assesses its data architecture for gaps and improvements
12
3-2-2 Data Sharing, Integration and Interoperability
Version 1
Data Sharing, Integration and
GD.3-2-2 Sub-Domain
I n t e r o p e r a b i l i ty
This sub-domain covers the collection of data from different sources and consists of integration solutions
Sub-Domain fostering a harmonious internal and external communication between various IT components that allows flexible
Description movement of data from one system to another to enable products and users to use multiple types of data within
the same solution.
Having common data standards as well as technologies for interoperability within the organization/ service
Sub-Domain Best-in-
provider or externally, widespread use of Application Programming Interfaces (APIs) for easier transfer of data
class Practices
internally and externally, incorporating data sharing techniques in all systems that are part of the data flow, etc.
Service provider does not consider data sharing as an important aspect when developing solutions and data is
1
often siloed off and not exposed to external systems or consumers
Service provider has planned the adoption of relevant technologies and practices that enable data sharing but
2 has not yet implemented it and has also identified the integration requirements necessary to integrate the IT
components including cost, resources required, etc.
Service provider has started implementing systems and standards internally for better data sharing and
3 interoperability, documents ETL, data flow and transformation instructions to improve integration between future
IT components
Service provider often builds solutions that support data sharing and interoperability internally and only
4 enables external integration in exceptional circumstances, does not participate in data sharing ecosystems or
marketplaces, and regularly verifies the correctness of data flows between integrated IT components
Service provider builds technical solutions that are designed to support integration of both internal and external
5 systems by default, enabling seamless integration of external data sources such as open data, different APIs,
proprietary systems, etc., and also participates in data ecosystems or marketplaces
Data Modeling is the process of discovering, analyzing, representing, and communicating data requirements in
Sub-Domain a precise form so that it is easy for data users to quickly interpret data and start using it. Without data models,
Description problems might arise such as conflicting standards and definitions, difficulty in locating data, lack of contextual
awareness while using certain data, etc.
Having an Enterprise Data Model (EDM) in place with comprehensive data aggregation covering most types of
Sub-Domain Best-in-
data relevant to the service provider, ideally covering data at the conceptual, logical and physical levels. The EDM
class Practices
should also be regularly updated and flexible to accommodate new types of data.
1 Service provider does not aggregate their data and do not plan to aggregate their data to achieve a granular view
Service provider is aggregating limited amounts of data albeit on a high level without a sufficiently granular view
2
of the data
Service provider is aggregating limited amounts of data and the model has a sufficiently granular view for most
3
complex use cases
Service provider has aggregated almost all relevant data, although the aggregation is not flexible and not to the
4
required granularity for complex use cases
Service provider has defined a clear source of truth for most data elements and has aggregated almost all
relevant data in a flexible Enterprise Data Model which has sufficient granularity for nearly all use cases excluding
5
a few exceptional use cases where off-the-shelf software would be required to make sure data is appropriately
represented
13
3-2-4 Data Management Tooling
Data Aspiration Technology And Data Data Operating Model Culture And Risk
Architecture
Data Management Vision and Data Architecture Data Governance, Ownership Talent, Skills and Capabilities
Strategy and Quality
Data Sharing, Integration and Data Culture
Data Management Roadmap Interoperability Data Operations and
Data Ethics and Risks
Data Product Processes
Data Modelling and Design
Data Ecosystem Personal Data Protection
Data Classification
Data Management Tooling
Data Value Realization Data Control Environment
Reference and Master Data
Management
An effective data operating model ensures that service providers would be able to take advantage of investments
in data related technologies through senior stakeholder alignment, proper data management policies, governance
and quality standards in order to make data easily usable by data and analytics teams to build value-generating
data use cases.
Sub-Domain Code Sub-Domain
GD.3-3-1 Data Governance, Ownership and Quality
GD.3-3-2 Data Operations and Processes
GD.3-3-3 Data Classification
GD.3-3-4 Reference and Master Data Management
GD.3-3-5 Data Security and Protection
14
3-3-1 Data Governance, Ownership and Quality
Service provider does not have a clear leadership structure for its data and analytics functions and has not
1 established data governance and quality standards; hence data is most often not tagged to a particular data
domain and is often of low quality with unclear ownership of data
Service provider has a data governance team embedded with IT/Risk, has started establishing centralized data
2 governance and quality standards, has mapped some data to a few domains with plans to map data to additional
domains, and is conducting spot checks for data quality issues for some data
Service provider has a Chief Data Officer responsible for coordinating data management activities across the
organization, has an effective centralized data governance structure with clear ownership with some high-level
3
data domains being very well-defined but inconsistently followed, and conducts regular data quality checks of
complete datasets which have identified several errors
Service provider has a Chief Data Officer empowered by a robust central governance organization which has
identified several clearly defined data domains although adherence to these domains is not perfect and data
4
quality is comprehensively assessed regularly on various dimensions (e.g., completeness, accuracy, timeliness,
uniqueness, validity, etc.) and is usually found to be adequate
Service provider has a Chief Data Officer, on the board of directors, empowered by a strong central governance
organization consisting of dedicated councils and committees which have identified several clearly defined and
well adopted data domains that span the entire organization of the service provider;
5
Service provider also comprehensively monitors data quality on various dimensions (e.g., completeness, accuracy,
timeliness, uniqueness, validity, etc.) with reporting and interventions in place in case any data quality issues are
identified, and data is fully checked against reference data sources with few deviations if any
This sub-domain covers the processes surrounding the design, implementation, and data storage and management
Sub-Domain
to maximize the value of data throughout its lifecycle from creation/acquisition to disposal as well as the
Description
involvement of leadership in these processes.
Having leadership involvement in the decision-making regarding data operations, and a well-defined operations
Sub-Domain Best-in-
plan which would require a service provider to perform activities such as forecasting storage requirements,
class Practices
database monitoring, establish access controls etc.
Service provider is creating a data operations plan that includes data operations such as forecasting data storage
2 requirements, prioritization of information systems for business criticality, processes for selection of database
management systems etc.
Service provider has a data operations plan in place but does not cover technical operations such as data lifecycle
3
management, database monitoring, access controls etc.
Service provider has a comprehensive data operations plan in place that exhaustively covers all technical and
4
business-specific operations and process linked with data storage management
Service provider has a comprehensive data operations plan in place that is frequently reviewed by leadership in
5
order to take strategic decisions on the data storage management practices
15
3-3-3 Data Classification
Data in any service provider organization should be classified on the basis of how critical it is to the success in a
Sub-Domain
business area, as well as how sensitive that data is to security and privacy in order for teams to prioritize which data
Description
to use, secure and track issues for.
Regularly tracking any data issues that may exist, ensuring high level of adherence to data classification guidelines
and well-defined data classification levels for all if not most types of data used by a service provider (e.g., 'Low
Sub-Domain Best-in-
Impact', 'High Impact', 'Public', 'Confidential', etc.), access management to restrict access of sensitive or critical
class Practices
data to only those users with a legitimate reason to access it, and enforcing classification standards by integrating
it across systems such as email gateways, web gateways and data loss prevention solutions.
Service provider does not classify data, any classifications may happen independently by business units or
1
analytics teams
Service provider classifies some types of data but does not actively enforce classification guidelines across the
2
organization
Service provider classifies most types of data and enforces classification guidelines for some critical types of data
3
elements (e.g., personal data, finance data, internal emails etc.)
Service provider classifies most types of data and enforces classification guidelines for all types of data elements
4 across the organization based on the level of risk associated with the data (e.g. Public, Internal, Confidential and
Protected) and its importance to business areas or functions
Service provider classifies all types of data and enforces effective classification guidelines with high degree of
5
adherence, data issues are regularly tracked and fixed by a dedicated team of specialists
This sub-domain allows linking of all critical data used by a service provider to a single reference and master data
architecture, making it easier for data users to find, use, and understand the data owned by the service provider.
Sub-Domain
Master Data Management solutions provide context to the data owned by a service provider and help to automate
Description
the process of classifying and managing the data. Master Data Management relies in part on the Metadata to
meet compliance requirements and minimize risk exposure.
Establishing clear policies and standards for categorization of data elements, designing and documenting an
Sub-Domain Best-in-
effective architecture for a Reference and Master Data Environment, assigning data stewards to Reference and
class Practices
Master Data etc.
Service provider does not have a reference and master data strategy and does not conduct any activities that may
1
potentially be covered under it
Service provider conducts activities such as classifying and identifying data objects used by the service provider
2
but does not conduct them as part of a reference and master data strategy in place
Service provider is in the process of implementing a reference and master data strategy which stipulates the
3 mapping of the data used by a service provider by identifying master data objects, sources, prioritization of objects
for inclusion, categorization of data objects, etc.
Service provider has a well-defined strategy on reference and master data and has successfully identified,
4 classified and mapped most of the data used by it and is now selecting a master data hub design to manage the
reference and master data objects
Service provider has successfully implemented a clear strategy on reference and master data which has led to
5 benefits such as improvement in data quality, improved data compliance, etc. and continues to innovate and adapt
to the best practices, architectures, and tools available globally
16
3-3-5 Data Security and Protection
Version 1
This sub-domain includes processes, people, and technology designed to protect the entity’s data by defining the
Sub-Domain
main data risks, restricting access to sensitive data assets and improving the cybersecurity infrastructure of an
Description
organization and following specific controls and guidelines set out by a corresponding regulatory authority.
Establishing an information security governance plan, having a dedicated team responsible for implementing
Sub-Domain Best-in-
information security practices, designing an information security architecture, keeping information security in
class Practices
mind while developing systems, having a robust identity and access management, etc.
Service provider does not have an organization-wide information security governance strategy, and has not
1 restricted access to data resulting in a broader audience for sensitive data than intended with no identity and
access management solutions in place
Service provider has implemented identity and access management solutions and is in the process of creating an
2 information security governance strategy and information security architecture but does not consider information
security as a priority while developing systems
Service provider effectively restricts access to most of their sensitive data while information security architecture,
3 identity and access management, incident management, and other security tools are being implemented as part
of the information security governance strategy
Service provider has automated access approval systems for sensitive data, has implemented information security
4 architecture, identity and access management, incident management, etc. as part of the information security
governance strategy and prioritizes information security capabilities in any technical solutions it builds
Service provider follows all recommendations by relevant information security guidelines set out by relevant
regulatory authorities and takes steps above and beyond what is specified, continues to innovate and improve
5
its data security and protection practices, and has successfully prevented data breaches through its effective
information security practices
17
GD.3-4 Culture and Risk
Data Aspiration Technology And Data Data Operating Model Culture And Risk
Architecture
Data Management Vision and Data Architecture Data Governance, Ownership Talent, Skills and Capabilities
Strategy and Quality
Data Sharing, Integration and Data Culture
Data Management Roadmap Interoperability Data Operations and
Data Ethics and Risks
Data Product Processes
Data Modelling and Design
Data Ecosystem Personal Data Protection
Data Classification
Data Management Tooling
Data Value Realization Data Control Environment
Reference and Master Data
Management
Service providers that hire appropriate talent, incentivize adherence to data standards, promote ethical use of
Governance Domain data and minimize risks to customers through data protection practices will be able to sustainably create a culture
Description that embraces the use of data as a strategically important asset to increase operational efficiency, develop new
products, improve existing products and services through innovative applications of data.
18
3-4-2 Data Culture
This sub-domain describes how well a service provider can drive cultural change amongst employees to change
Sub-Domain
their approach to treating data as an asset in order to bring about self-driven innovation to build new use cases
Description
from data and encourage self-discipline regarding adherence to data standards.
Best-in-class practices would differ from one service provider to another depending on the current maturity,
Sub-Domain Best-in-
ideal target state and planned scope for this transformation. Activities can include conducting trainings, tracking
class Practices
performance on data KPIs, conducting interviews to understand challenges, reward better performance etc.
Service provider is in the process of creating a data culture strategy and is currently trying to understand the
2
mindsets, behaviors and pain points of employees
Service provider is rolling out some elements of a data culture strategy for a few select business units such as
3
training and awareness programs, tracking relevant KPIs and sharing objectives of the strategy with employees
Service provider has an enterprise-wide data culture strategy including training and awareness programs, tracking
4 relevant KPIs, sharing target state, incentivizing adherence to data standards but the strategy has not yet led to
self-driven data innovation use cases
Service provider has implemented a well-defined enterprise-wide data culture strategy which has led to
5 significantly higher data-driven innovation across roles at all levels, overall improvement in usability of data and an
understanding of the benefits brought on by best data practices by most employees.
This sub-domain refers to the ethical usage of data and analytics models in order to protect the rights of individuals
Sub-Domain who may be influenced or impacted by products developed by the service providers as well as the management
Description of the associated risk with using data that, if compromised or misused, may cause financial, legal, security,
reputational or other types of risks.
Having well-defined practices regarding the ethical use of data and practices to mitigate potential data risks,
Sub-Domain Best-in- taking decisions on the risk appetite supported by senior management, having a governance structure to monitor
class Practices adherence to these practices and an intervention mechanism to ensure unethical data practices and actions that
may cause risks are prevented from taking place.
1 Service provider does not look at data ethics and risk as part of its data strategy
Service provider is building a data ethics and risk strategy, including defining a set of ethical data practices and
2
identifying potential risks that might arise from data owned or used by the service provider
Service provider has a data ethics and risk strategy in place which educates employees of ethical data practices,
3 instructs employees on how to mitigate data risks that they might encounter and is also setting up a council or
committee to monitor adherence to the data ethics and risks
Service provider has a data ethics and risk strategy in place. A functioning council or committee regularly monitors
4 if data users are compliant with ethical data practices defined by the organization as well as the measures to
mitigate data risk
Service provider has a comprehensive data ethics and risk strategy in place which has successfully identified
and intervened whenever potential unethical data practices were being used or data was being used without
5
considerations to risks, the service provider is also continuously improving its capabilities and is collaborating with
its partners and suppliers to follow similar guidelines
19
3-4-4 Personal Data Protection
As service providers collect and gather more data than ever before, it is critical that the personal data of customers,
Sub-Domain
and employees are protected. Service providers must ensure that data breaches are avoided and that proper
Description
safeguards are put in place to ensure the proper handling and non-disclosure of personal information.
Sub-Domain Best-in- Conducting regular assessments of the data protection policies of the service provider, conducting training,
class Practices having robust policies and processes to manage data breaches, having well-defined privacy policies, etc.
Service provider does not have a personal data protection plan in place and has not conducted an assessment
1 of its personal data protection environment (i.e., the rules, tools, techniques, procedures, etc. that are in place to
protect personal data)
Service provider is creating a personal data protection plan that is expected to be implemented in the next twelve
2 months and has not yet conducted an assessment of its personal data protection environment (i.e., the rules, tools,
techniques, procedures, etc. that are in place to protect personal data)
Service provider has a personal data protection plan in place or is in the process of conducting an assessment of its
3 personal data protection environment (i.e., the rules, tools, techniques, procedures, etc. that are in place to protect
personal data)
Service provider has a personal data protection plan in place and has conducted an assessment of its personal
data protection environment (i.e., the rules, tools, procedures, etc. that are in place to protect personal data); the
4 service provider also has processes in place to notify authorities and customers in case of data breaches and
provides clear communication to customers and other data subjects of their personal data protection rights;
service provider is fully compliant with all relevant regulations on personal data protection
Service provider regularly reviews and revamps its data protection practices to account for new risks that might
emerge, has adopted the best-in-class practices for personal data protection, has a consistent record of ensuring
5
personal data is not compromised, and innovates in this space by testing new technologies, techniques and
practices in personal data protection
Data Control Environment consists of policies and procedures that are used to manage and protect data, as well
Sub-Domain as the people, and processes involved in the data lifecycle. An effective data control environment helps a service
Description provider to implement privacy and security policies as well as ensure data is effectively used to make informed
decisions.
Having clear policies and procedures on how data should be collected, stored, processed, and used while ensuring
Sub-Domain Best-in-
transparency, collaboration, and alignment between data users, data owners, and the data management office
class Practices
across the data lifecycle with proper audits in place when necessary.
Service provider does not have a data control environment in place and data may be collected and stored in an ad
1
hoc manner, without any formal processes or controls in place
Service provider is currently building a formal data control environment to align cross-organizational data
2 management capabilities, employees are being made aware of their responsibilities and some basic policies and
technologies may be used to support these processes
Service provider has a defined formal data control environment which has been adopted by most of the organization
3 with a comprehensive set of policies and processes applicable on several teams but most the technologies to
support the data control environment is still manual and not automated
Service provider has a defined formal data control environment that is widely adopted, understood and followed
by stakeholders to align data management capabilities, policies and standards across most business units, a well-
4
established culture of adherence to data management policies, and a gradual adoption of automation techniques
in the processes and auditing of the enforcement of these policies and procedures
Service provider has a defined formal data control environment and it is a well-established part of the business
as usual with most business units having successfully aligned their data management capabilities, policies and
5
standards and has also automated several of the repetitive tasks in the processes and auditing of the enforcement
of the policies and procedures that are part of the data control environment
20
Glossary
ـــــــــــــــــــــــ
Cybersecurity
Key Performance Indicator (KPI)
Personal Data
Data
Any element of data, alone or in connection with
other available data, that would enable the
A collection of facts in a raw or unorganized form identification of a Saudi citizen.
such as numbers, characters, images, video, voice
recordings, or symbols. ـــــــــــــــــــــــ
ـــــــــــــــــــــــ
Privacy
ـــــــــــــــــــــــ
Setting the sensitivity level of data and information
that results in security controls for each level of
classification. Data and information security levels
are set according to predefined categories where
data and information is created, modified,
improved, stored or transmitted. The classification Service Provider
level is an indication of the value or importance of
the data and information of the organization.
The service provider of under CST laws and
ـــــــــــــــــــــــ regulations.
ـــــــــــــــــــــــ
The amount and type of risk that an organization is Data stewardship is a collection of functions
willing to take in order to meet their strategic that ensure all data assets of an organization
objectives. are accessible, usable, safe, and trusted.
ـــــــــــــــــــــــ ـــــــــــــــــــــــ
21
Appendix
GD.3-1 Data Aspiration Maturity Assessment Template
(1-5) E = (C * D)
GD.3-1-1 Data Management 20%
Vision and Strategy
GD.3-1-2 Data Management 20%
Roadmap
GD.3-1-3 Data Product 20%
GD.3-1-4 Data Ecosystem 20%
GD.3-1-5 Data Value 20%
Realization
Maturity Score for [SUM of Column E]
GD.1 Data Aspiration
(1-5) E = (C * D)
GD.3-2-1 Data Architecture 25%
GD.3-2-2 Data Sharing, 25%
Integration and
Interoperability
GD.3-2-3 Data Modelling and 25%
Design
GD.3-2-4 Data Management 25%
To o l i n g
Maturity Score for [SUM of Column E]
GD.2 Technology and
Data Architecture
(1-5) E = (C * D)
GD.3-3-1 Data Governance, 20%
Ownership and
Quality
GD.3-3-2 Data Operations and 20%
Processes
GD.3-3-3 Data Classification 20%
GD.3-3-4 Reference and Master 20%
Data Management
GD.3-3-5
Data Security and Protection
20%
Maturity Score for [SUM of Column E]
GD.3 Data Operating
Model
22
GD.3-4 Culture and Risk Maturity Assessment Template
(1-5) E = (C * D)
GD.3-4-1 Talent, Skills and 20%
Capabilities
GD.3-4-2 Data Culture 20%
GD.3-4-3 Data Ethics and Risks 20%
GD.3-4-4 Personal Data 20%
Protection
GD.3-4-5 Data Control 20%
E n v i r o n m e n t
Maturity Score for GD.4 Culture and Risk [SUM of Column E]
E = (C * D)
GD.3-1 Data Aspiration 25%
GD.3-2 Technology and Data 25%
Architecture
GD.3-3 Data Operating 25%
Model
GD.3-4 Culture and Risk 25%
Overall Data [SUM of Column E]
Governance Maturity
Score for Service
Provider
23
cst.gov.sa