JOnline: Book Review—Master Data Management and Data Governance 

Download Article

Master Data Management and Data GovernanceThe creation of a ‘single version of the truth’ and managing the quality of data are key for any enterprise. As enterprises are collecting an ever- increasing amount of information, they face the challenge of managing data that are complete, accurate, relevant and secure. The same data also need to be uniformly available to all units within the enterprise. Master data management (MDM) and data governance have emerged as disciplines that seek to help enterprises address these challenges.

Master Data Management and Data Governance is a reference guide that looks at the topics of MDM and data governance from multiple perspectives. The book explores issues, approaches, concerns, drivers, benefits, architecture, applications and trends of MDM and data governance.

Master Data Management and Data Governance is divided into five parts. Part one sets the tone of the book by introducing the reader to MDM, then providing an overview of the drivers and challenges of MDM. The application of MDM is also demonstrated across different industries, including financial services, telecommunications and the public sector.

Part two deals with the architectural considerations for MDM and outlines how MDM architecture has evolved over the years. Two key concepts relevant to MDM architecture are discussed: enterprise architecture framework and service-oriented architecture.

Part three explores compliance requirements and risks associated with MDM. Implementation of MDM solutions may expose the enterprise to various information risks of which MDM practitioners need to be aware. This part is particularly useful to information systems audit and security professionals who are responsible for ensuring that the risk associated with MDM initiatives is properly considered and mitigated.

Part four discusses the practical approaches to implementing an MDM solution. This section is valuable for enterprises because it outlines how to build a business case and a road map for MDM. A business case for MDM is critical for obtaining the buy-in of management and other stakeholders. Master data governance is also discussed in greater detail in this part of the book.

Part five concludes the book by looking at the vendor solutions that are available on the market. A summary of the key takeaways from the book is provided, and the publication closes with a look at future trends of MDM.

Master Data Management and Data Governance is targeted at a variety of professionals with an interest in MDM and data governance. Information security professionals and auditors will also find the book useful, as it tackles the information risk associated with MDM.

A key strength of the book is the comprehensive and practical way the topics are explained. While MDM is clearly a technical subject, other dimensions, such as the business side of implementing MDM solutions, are equally well addressed. Regulatory and security aspects are explained as they relate to MDM and data governance, and the authors do a brilliant job of distilling all the various dimensions into an easy-to-comprehend text.

Editor’s Note

Master Data Management and Data Governance is available from the ISACA Bookstore. For information, see the ISACA Bookstore Supplement in this Journal, visit, e-mail or telephone +1.847.660.5650.

Reviewed by Bright Munongwa, CISA, CGEIT, CRISC, CIA, a specialist IT auditor at Nedbank Ltd., one of South Africa’s Big Four banks. Munongwa serves on the ISACA Publications Subcommittee.

Enjoying this article? To read the most current ISACA Journal articles, become a member or subscribe to the Journal.

The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the ISACA Journal.

Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors’ employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors’ content.

© 2012 ISACA. All rights reserved.

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.