Implementing DSAR Orchestration at Scale
REQUEST INTAKE AND VERIFICATION
Users submit via web, email, or API. First: verify identity (email/SMS/login) to prevent malicious requests. GDPR requires response within 30 days; CCPA 45 days. Log receipt timestamp for SLA tracking. Route by type: access, deletion, correction, or portability.
DATA DISCOVERY AND MAPPING
Orchestrator queries all sources: databases, feature stores, training sets, logs, vendors. Each implements a standard interface. Maintain a data catalog mapping identifiers to storage—without this, DSARs fail silently.
EXECUTION AND CONFIRMATION
For deletion: execute in all systems, confirm, retry failures. Handle eventual consistency. For access: aggregate into portable format. Generate confirmation report. Store audit evidence for regulators.
SCALE CONSIDERATIONS
At 100M users, expect 50-500 DSARs daily. Automate everything—manual cannot scale. Batch similar requests. Queue to avoid overwhelming stores. Monitor SLA and alert on approaching deadlines.