Datamasking/Encryption Oracle Security

advertisement
SOFTWARE BUSINESS CASE
ORACLE SECURITY SOFTWARE
DATAMASKING & ENCRYPTION
TABLE OF CONTENTS
EXECUTIVE SUMMARY .............................................................................................................................3
1.
Problem Definition ......................................................................................................................4
2.
Addressing Problem with CWU existing tools and products (i.e. PeopleSoft) .................................4
3.
Organizational Impact .................................................................................................................4
4.
Benefits ......................................................................................................................................6
5.
Strategic Alignment .....................................................................................................................7
6.
Cost ............................................................................................................................................8
7.
Alternatives (add lines as necessary) ............................................................................................8
8.
Timing / Schedule (add lines as necessary) ...................................................................................8
9.
Technology Migration/Resource Identification .............................................................................9
10. Product Life/Application Sunsetting or Decommissioning ............................................................9
11. References .................................................................................................................................9
12. Recommendation ..................................................................................................................... 10
13. Approvals................................................................................................................................. 10
Oracle Security Software / Datamasking & Encryption
Page 2 of 10
EXECUTIVE SUMMARY
In our current environment, all PeopleSoft data is stored in an unencrypted format on our servers. While
we go to great lengths to secure this data while it is in transit (i.e. while being accessed by a user) we
currently do not have any encryption for this data while it is at rest. In addition, we currently use
production data in our non-production environments that has not been masked or obfuscated. This
creates several risks that may result in unauthorized disclosure of sensitive and confidential data. The
following is a list of the main security considerations associated with these risks:
1. Industry Standard: Encrypting and masking sensitive data is a best practice in that it introduces
more controls and generally increases the security of our systems and data. It also addresses
compliance requirements associated with federal regulations and laws (e.g. PCI and HIPAA).
2. The Portal: By implementing the Portal we are adding new functionality and increasing the
accessibility to our core business systems and associated data. This increases the risk of
inadvertent exposure of this data.
3. External Attackers: In the event an external attacker breaches our perimeter defenses, our core
business data is at great risk of unauthorized disclosure because we store it in clear-text (i.e.
unencrypted).
4. Malicious Insider: In the event we encounter a malicious insider, we have to make sure our data
remain secure regardless of where it is located. In our current state, data is easily copied to an
external device for exploitation or unauthorized disclosure at a later date.
5. CedarCrestone Recommendation: This business case is consistent with the finding and
recommendation in the Applications Portal Configuration and Security Recommendations
document, developed by CedarCrestone.
Oracle database systems that include the Advanced Security Option pack provide a turnkey solution
named Transparent Data Encryption (TDE) for encrypting confidential PeopleSoft data as it resides on
the storage media. While infrastructure and application security mechanisms can protect this data as
users and administrators interact with the application, data stored unencrypted on the storage media is
vulnerable to exploitation outside of the application framework.
Data masking refers to the process of obfuscating potentially sensitive data in non-production
databases. Database administrators (DBAs) will occasionally copy production data into development or
test environments to allow developers to perform application development and application testing. The
problem with data sharing is that copies of production data contain confidential, sensitive or personally
identifiable information, access to which should be controlled.
Both the Data Masking Software Pack and the Advanced Security Option are collectively referred to the
Oracle Security Software in this business case. The Advanced Security Option will be used to encrypt our
data in all environments, with the exception of DEMO. The Data Masking Software Pack will be used to
obfuscate the data in all non-production environments, with the exception of DEMO.
Oracle Security Software / Datamasking & Encryption
Page 3 of 10
Sponsoring Department(s): Security Services Department
Date of Business Case Preparation: 9/24/13
Contact Person Name/Phone: Andreas Bohman / 2499
New Product/Service
If there is a draft or sample contract, please provide a copy.
Renewal of Existing Product/Service – if checked, include background information.
If there is a site license agreement, existing contract or new contract draft, please provide a
copy.
1. Problem Definition
Central Washington University’s Enterprise Resource Planning (ERP) data is not encrypted
while at rest on our storage media. While infrastructure and application security
mechanisms can protect sensitive data as users and administrators interact with the
application, data stored unencrypted on the storage media is vulnerable to exploitation
outside of the application framework. In addition, our data is not obfuscated in any of our
databases. This introduces the risk of inadvertent disclosure and exposing confidential and
sensitive information when sharing production data with application developers or software
quality testers who do not otherwise have access to this data in the production system.
2. Addressing Problem with CWU existing tools and products (i.e. PeopleSoft)
As the Oracle database environments are proprietary, there are no supported alternative
products available for data encryption. Even though there are some open-source products
that will encrypt and obfuscate Oracle databases, none of the products are supported by
Oracle. Our Campus Solutions PeopleSoft database has a real-time obfuscation process that
is currently in use. However, this process only obfuscates that data as it is being used and it
does not obfuscate the data at rest. Since this is a real-time process, it is not appropriate as
an enterprise solution and it is only available for the Campus Solution PeopleSoft database.
It is possible to manually mask the PeopleSoft data but this is a very resource intensive and
repetitive task and not recommended.
3. Organizational Impact
This is an enterprise need and it will benefit all users of our PeopleSoft ERP.
Data Masking Stakeholders: The primary stakeholders for the Data Masking software are
the Business Analysts/Functional Leads, Security Services Department, and Information
Technology Services (ITS). However, since this is an enterprise solution, all functional groups
will benefit from the added security.
Data Encryption Stakeholders: The encryption process is a one-time process that is
executed on all data – or ‘tablespaces’ - in our Oracle databases. Once the data is encrypted,
all subsequent data writes and reads will also be encrypted. The primary stakeholders for
the Data Encryption software are the Security Services Department and ITS.
Oracle Security Software / Datamasking & Encryption
Page 4 of 10
Contributors: The contributors to the requirements for this business case are the Business
Analysts/Functional Leads, Security Services, ITS, and CedarCrestone. Within ITS the group
with the most impact are the DBAs and they have been involved in the development of this
business case.
Resource Impact: There will be an impact on resources from Business Analysts/Functional
Leads, Security Service, ITS, and CedarCrestone. In discussing the potential impact and
availability of resources, all stakeholders have indicated they are able to support this effort
as part of or in addition to the overall iCAT project, with the exceptions and caveats noted in
the timeline below.
Changes to Existing Systems: In order to implement the Data Encryption software, changes
have to take place in our current environment. The Data Encryption changes are relatively
minor in comparison to the Data Masking changes and are seen as the least effort of the
two. Below is an overview of the process and changes needed:
1. Since existing tablespaces cannot be encrypted, it is necessary to move the
application data from clear-text tablespaces to encrypted copies of the original
tablespaces. The first step in this process is to extract the application data using an
Oracle export utility such as data pump. This is the same process used for moving
our data to the lab as part of the current upgrade and split.
2. New, encrypted tablespaces have to be created to mirror the existing clear-text
tablespaces. Special considerations have to be made for indexes. The Migration
Guide provides detailed instructions and scripts that allow the DBA to perform these
activities.
3. The clear-text tablespaces are dropped and the application data is brought back into
the database using an Oracle import utility such as data pump.
4. Once all of the encryption activities are complete and the application data is stored
in the encrypted tablespaces, the PeopleSoft application is capable of running as
before with no additional changes.
In order to implement the Data Masking software, changes have to take place in our current
environment. Oracle has development a comprehensive 4-step approach to implementing
data masking via Oracle Data Masking Pack called: Find, Assess, Secure and Test (F.A.S.T).
These steps are:
1. Find: This phase involves identifying and cataloging sensitive or regulated data
across the entire enterprise. Typically carried out by business or security analysts,
the goal of this exercise is to come up with the comprehensive list of sensitive data
elements specific to the Data Masking Best Practice organization and discover the
associated tables, columns and relationships across enterprise databases that
contain the sensitive data.
2. Assess: In this phase, developers or DBAs in conjunction with business or security
analysts identify the masking algorithms that represent the optimal techniques to
Oracle Security Software / Datamasking & Encryption
Page 5 of 10
replace the original sensitive data. Developers can leverage the existing masking
library or extend it with their own masking routines.
3. Secure: This and the next step may be iterative. The security administrator executes
the masking process to secure the sensitive data during masking trials. Once the
masking process has completed and has been verified, the DBA then hands over the
environment to the application testers.
4. Test: In the final step, the production users execute application processes to test
whether the resulting masked data can be turned over to the other non-production
users. If the masking routines need to be tweaked further, the DBA restores the
database to the remasked state, fixes the masking algorithms and re-executes the
masking process.
Training Requirements: There are training requirements associated with both products but
they are relatively minor. The security administrator has to be proficient in the use of the
data masking solution and the DBAs have to be proficient in the application of the
encryption software. The intent is for CedarCrestone to develop the process required for the
data masking and encryption with the internal security administrators and DBAs executing
the process.
All Stakeholders:
Department
Name
Security Services
Andreas Bohman
Security Services
Jamie Schademan
Security Services
Barbara Bisson
ITS
Jason Ringer
ITS
Barry Carlson
CedarCrestone
Gene Shoda
CedarCrestone
Daniel Tarango
CedarCrestone
Brennan Folmer
Finance
Tim McGuire
Human Resources
Jill Hernandez
Admissions
Debbie Hunt
Registrar Services
Lidia Anderson
4. Benefits
Data Encryption Benefits:


Data is encrypted on disk, and any backups stored on external tape remain
encrypted.
Effective mitigation of risk associated with other attack vectors.
Oracle Security Software / Datamasking & Encryption
Page 6 of 10




No additional storage is required for the encrypted database files; the database size
remains the same.
The encryption and decryption is transparent to the PeopleSoft applications. No
PeopleSoft-level code changes are necessary.
No additional triggers, views, or stored procedures have to be implemented or
maintained when using TDE.
The encryption/decryption overhead added by TDE has been reported by internal
Oracle testing to be approximately 2-4%, which should be considered reasonable
when compared to the other benefits.
Data Masking Benefits:



Data in non-production systems is no longer recognizable as valid personal/sensitive
data. CWU would not need to be concerned about unauthorized access or
extraction of sensitive data from non-production systems, which are generally
available to a much wider development/testing audience.
Depending on audit requirements in place at CWU, having sensitive data available to
developers/testers in non-production systems may be a violation.
Using a tool such as the Oracle Data Masking pack allows data to be masked which
still preserving referential integrity of the PeopleSoft application. In other words,
the PeopleSoft application will still function as expected with the masked data.
5. Strategic Alignment
Student success: CWU believes that student success is best achieved by providing
supportive learning and living environments that encourage intellectual inquiry, exploration,
and application.
Strategic Alignment: By providing for a secure yet highly available environment, we ensure
ready access to information will still providing our students with the confidence that we will
protect their confidential information.
Access: CWU believes in providing educational opportunities to as many qualified students
as possible. CWU believes that restrictions of place, time, and finances can be overcome
through the effective use of partnership with community colleges and by effective and
efficient use of learning, communication, and social technologies.
Strategic Alignment: As we broaden our enterprise environment too meet this strategic
vision, we have to ensure we also maintain the confidentiality and integrity of our
customer’s data, regardless of where the data is located. We have to provide for security
throughout the life-cycle of the data.
Shared Governance: CWU believes that shared governance is most effective when
information systems and decision-making processes are both robust and transparent. CWU
believes that communication channels should be open and two-way and that faculty, staff,
and students should be empowered to participate in the governance systems.
Strategic Alignment: Securing our customer data is an important part of building and
implementing robust and transparent information systems and decision-making processes.
Oracle Security Software / Datamasking & Encryption
Page 7 of 10
6. Cost
There is currently no funding for this business case.
Cost Breakdown:
Product and Services
1 Advanced Security
Option
2 Product Support and
Software Updates
3 Data Masking Pack
License
Named
User
Named
User
Units
12955
12955
4 Product Support and
Software Updates
License
Support
List Price
$2,979,650.00
Disc %
96
Extended
$119,186.00
$655,523.00
96
$26,220.92
$2,979,650.00
96
$119,186.00
$655,523.00
96
$26,220.92
$5,959,300.00
$1,311,046.00
$7,270,346.00
96
96
Total
$238,372.00
$52,441.84
$290,813.84
$500,581.20
5-Year Cost
7. Alternatives (add lines as necessary)
Alternative
Reasons For Not Selecting Alternative
Do nothing
High level of risk associated with the
confidentiality and integrity of our
customer’s information. The risk is primarily
associated with a data breach and
unauthorized access to our customer’s
data. This has the potential to negatively
impact the reputation of CWU and it may
have an impact on admissions.
Only Use Real-Time CS Obfuscation
This process is not available - nor is it
appropriate – for the other databases.
8. Timing / Schedule (add lines as necessary)
Task
Target Date
Purchase Data Masking and Data Encryption Software
10/15/2013
Install Data Encryption Software Solution
11/01/2013
Develop Data Encryption Procedure
11/15/2013
Oracle Security Software / Datamasking & Encryption
Page 8 of 10
Task
Target Date
Test and Implement Data Encryption Procedure
12/15/2013
Data Encryption Implementation Completed (Go-Live)
01/27/2014
Install Data Masking Software Solution
02/28/2014
Develop Find, Assess, Secure and Test (FAST) Procedure
03/15/2014
Test and Implement FAST Procedure
04/01/2014
Data Masking Implementation Completed (Go-Live)
04/15/2014
9. Technology Migration/Resource Identification
Data Encryption Software Resources:
Resource
Personnel
Requirements
CedarCrestone Consultant
ITS DBAs
Security Administrator/CISO
Timeframe
11/01/2013 – 12/15/203
12/15/2013 – 01/27/2014
10/15/2013 – 01/27/2014
Data Masking Software Resources:
Resource
Personnel
Requirements
CedarCrestone Consultant
Business Analysts
ITS DBAs
Security Administrator/CISO
Resource
Jan
Feb
Mar
Apr
Security Admin
10
10
15
15
5
5
Business Analysts
May
Timeframe
02/28/2014 – 03/15/2014
03/15/2014 – 04/01/2014
04/01/2014 – 04/15/2014
02/28/2014 – 04/15/2014
June
July
Aug
Sept
Oct
Nov
Dec
10
10
5
10
ITS DBA
10
CedarCrestone
10
5
10
5
5
5
5
Total Hours
30
15
30
25
5
20
25
10. Product Life/Application Sunsetting or Decommissioning
Both the Data Encryption and Data Masking software is tied to the product life of our
PeopleSoft environment.
11. References
Oracle – Implementation Guidance
Oracle Security Software / Datamasking & Encryption
Page 9 of 10
CedarCrestone – Pricing Information and Feasibility Study
ITS DBAs – Availability and buy-in for initiative.
Business Analysts - Availability and buy-in for initiative.
12. Recommendation
Oracle database systems that include the Advanced Security Option pack provide a turnkey
solution named Transparent Data Encryption (TDE) for encrypting potentially sensitive
PeopleSoft data as it resides on the storage media. While infrastructure (firewalls, nonaddressable network zones, ACLs) and application security mechanisms (PeopleSoft roles,
permission lists, row-level security) can protect sensitive personally identifiable information
as user and administrators interact with the application, data stored unencrypted on the
storage media is vulnerable to exploitation outside of the application framework.
Data masking refers to the process of obfuscating potentially sensitive data in nonproduction databases. Database administrators (DBAs) will occasionally copy production
data into staging or test environments to allow developers to perform application
development and application testing. The problem with data sharing is that copies of
production data often contain confidential, sensitive or personally identifiable information,
access to which may be restricted by government regulations. Therefore, CWU runs the risk
of exposing sensitive information when sharing production data with application developers
or software quality testers who may not otherwise have access to this data in the
production system.
It is recommended that CWU purchase and implements the Advanced Security Option and
Data Masking feature of the Oracle database system and obfuscates and encrypts all
PeopleSoft tablespaces for all applications.
13. Approvals
The following actions have been taken by the appropriate Sub-Council (ATAC or NonAcademic Sub-Council) and Enterprise Information Systems Committee (EISC):
Date
Action
By
9/26/13
Approved to be Reviewed by EISC
Non-Academic Sub-Council
9/30/2013
Presented to EISC
Andreas Bohman, CISO
9/30/2013
Approved to be Reviewed by Cabinet
EISC
Upon approval by the Enterprise Information Systems Committee (EISC) or one of the two SubCouncils (Academic or Non-Academic), CWU procurement policies and procedures should be
used to initiate a purchase. Please contact the Purchasing office at x1001 with any questions
regarding the procurement process.
If you have any questions, please contact Sue Noce 963-2927 or Tina Short 963-2910.
Oracle Security Software / Datamasking & Encryption
Page 10 of 10
Download