You've learned about security and governance controls. Now let's practice implementing this for your cloud-native, containerized pipelines.
Security isn't just about preventing breaches—it's about controlling access, tracking lineage, and ensuring compliance.
Engagement Message
Ready to secure your data flows?
Type
Multiple Choice
Practice Question
A data engineer needs to debug a pipeline that processes customer PII, but they shouldn't see actual customer data. What's the best approach?
A. Give them full access to production data B. Use data masking to hide sensitive fields C. Deny all access to the pipeline D. Only allow access during business hours
Suggested Answers
- A
- B - Correct
- C
- D
Type
Sort Into Boxes
Practice Question
Sort these security controls into the correct categories:
Labels
- First Box Label: Access Control
- Second Box Label: Data Protection
First Box Items
- Role-based permissions
- User authentication
- Multi-factor authentication
Second Box Items
- Encryption at rest
- Data masking
- Field-level security
Type
Swipe Left or Right
Practice Question
Let's practice matching governance needs to the right solutions. Swipe each scenario to the appropriate control:
Labels
- Left Label: Data Lineage
