Privacy controls and methodologies have evolved following the practices of IT security.
DLP: Data Loss and Protection
IAM: Identity and Access Management
user provisioning,
access governance,
privileged identity management,
identity-as-a-service (IDaaS)
SEIM: Security Information Event Management
GRC: