Data Security Glossary

No matter what your role is within an organization, this data security glossary is intended for anyone from the security leader to the security practitioner.

Data mapping

Data mapping enables teams to understand the location, source and destination of their data, including previously unknown shadow data, its format and type, and which transformations it undergoes. It is used both to ensure compliance with data protection regulations and standards, and governance standards that often require organizations to map data because it provides visibility into potential risk.