Privacy controls and methodologies have evolved following the practices of IT security.

DLP: Data Loss and Protection

IAM: Identity and Access Management

user provisioning,

access governance,

privileged identity management,

identity-as-a-service (IDaaS)

SEIM: Security Information Event Management

GRC: