Deliverables

SQP, requirements catalogue, package details, method of rolling out. DataMart Lifecycle (Development Plan) Output Purpose Owner Location Data Source Inventory Identify relevant data sources within the organisation, including databases, applications, and external sources. Data Architect/Engineer (with Data Specialist) myBMT(Data Objects) Data profiling reports Profile data sources to understand data quality, structure, and relationships. Data Architect/Engineer … Read more

Review Meetings

Frequency, location and style of meetings, who should attend. To include standups/sprint meetings, code review methods and end of project review. Incorporating an Agile approach forms an integral aspect of the Data Engineering development process. By dividing the development cycle into smaller segments, iterations, and sprints, Agile methodologies enable engineers and data specialists to collaborate … Read more

Project Organisation

People involved and their roles, chains of command and reporting methods, distribution list of SQP. Data Steering Committee Data Stewards Data Specialists Quality Behaviours of Data Specialists Data Engineering Data Mesh Principle The Data Mesh decentralises data ownership by transferring the responsibility from the central data team to the business units that create and consume … Read more

Scope of Task

Scope covered by the project and any documents received. Technical Perspective The Data Warehouse Development Quality Plan describes the creation, organisation, movement, change and storage of data from the perspective of the technical and physical implementation. The scope of the Data Warehouse Development Quality Plan encompasses the following key areas: Business Perspective The business perspective … Read more

Security Requirements

Security specific requirements for the project. Assessment of changes on existing system security. The confidentiality, integrity, and availability (CIA) model is widely used by organisations to implement appropriate security controls and policies, which helps identify key problem areas and the necessary solutions to resolve these issues. Access Control and Authorisation: Role-based access mechanisms and strict … Read more