What is data masking?

advertisement
Proteja su información sensible en
ambientes no-productivos
Failure Story – A Real Life Insider Threat
 28 yr. old Software Development Consultant
 Employed by a large Insurance Company in Michigan
 Needed to pay off Gambling debts
 Decided to sell Social Security Numbers and other identity
information pilfered from company databases on 110,000
Customers
 Attempted to sell data via the Internet
– Names/Addresses/SS#s/birth dates
– 36,000 people for $25,000
 Flew to Nashville to make the deal with…..
 The United States Secret Service (Ooops)
Results:
 Sentenced to 5 Years in Jail
 Order to pay Sentry $520,000
Agenda
■
Non-Production environments at risk
■
What is data masking?
■
InfoSphere Optim Data Masking Solution
– Static data masking for test environments
– Programmable data masking for applications
■
InfoSphere Optim Test Data Management Solution
■
Maximize business value
The Easiest Way to Expose Private Data …
Internally with the Test Environment
 70% of data breaches occur internally
(Gartner)
 Test environments use personally
identifiable data
 Standard Non-Disclosure Agreements
may not deter a disgruntled employee
 What about test data stored on laptops?
 What about test data sent to
outsourced/overseas consultants?
 How about Healthcare/Marketing
Analysis of data?
 Payment Card Data Security Industry
Reg. 6.4.3 states, “Production data (real
credit card numbers) cannot be used for
testing or development”
* The Solution is Data De-Identification *
Vulnerable non-production environments at risk
Most ignore security in non-production environments
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
70%
$194
of organizations surveyed use live
customer data in non-production
environments (testing, Q/A, development)
per record
cost of a data breach
Database Trends and Applications. Ensuring Protection for Sensitive Test Data
The Ponemon Institute. 2012 Cost of Data Beach Study
50%
52%
of organizations surveyed have no way
of knowing if data used in test was
compromised
of surveyed organizations
outsource development
The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis
The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis
Monitor
& Audit
What is data masking?

Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Definition
Method for creating a structurally similar but inauthentic version of an
organization's data. The purpose is to protect the actual data while having a
functional substitute for occasions when the real data is not required.

Requirement
Effective data masking requires data to be altered in a way that the actual values
cannot be determined or reengineered, functional appearance is maintained.

Other Terms Used
Obfuscation, scrambling, data de-identification

Commonly masked data types
Name, address, telephone, SSN/national identity number, credit card number

Methods
–
–
Static Masking: Extracts rows from production databases, obfuscating data
values that ultimately get stored in the columns in the test databases
Dynamic Masking: Masks specific data elements on the fly without touching
applications or physical production data store
Secure &
Protect
Monitor
& Audit
Start privacy early
Model-driven privacy
Define data policies and standards once, execute
consistently across the lifecycle
– Naming
– Meaning
– Values
– Privacy
Use standard words, acronyms and naming
patterns
Associate words with shared meaning through
business glossaries (InfoSphere Business Glossary)
Define appropriate values or ranges for
attributes
Specify standards for masking rules and
associate them with specific attributes
Link standards to business requirements
Discover and elaborate explicit and implicit relationships for
understanding business objects
Reuse across multiple models and databases
Share, reuse, or extend the policies and standards
across tools
Generate reports for audit (Data privacy compliance,
Requirements traceability)
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Monitor
& Audit
IBM InfoSphere Optim Data Masking Solution
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Monitor
& Audit
Requirements
De-identify sensitive information
with realistic but fictional data
• Protect confidential data
used in test, training &
development systems
• Mask data on screen in
applications
• Implement proven data
masking techniques
• Support compliance with
privacy regulations
• Solution supports custom
& packaged ERP
applications
Benefits
JASON MICHAELS
ROBERT SMITH
Personal identifiable information
is masked with realistic but
fictional data
• Protect sensitive
information from misuse
and fraud
• Prevent data breaches and
associated fines
• Achieve better information
governance
Mask complete business objects across
heterogeneous databases & applications
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Business
View
Overall historical “snapshot”
of business activity,
representing an application
data record – e.g. payment,
invoice, customer
DBA
View
Referentially-intact subsets of data across
related tables & applications, including
metadata.
ERP / Financials
CRM on
Custom Inventory Mgmt
on DB2
Oracle database
on DB2
Federated access to related business objects across the enterprise
9
Monitor
& Audit
Mask data in applications
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Monitor
& Audit
Patient Information
Patient No 123456
SSN 333-22-4444
Name Erica Schafer
Address 12 Murray Court
City Austin
State TX
Zip 78704
Programmatically
mask
Patient No. 112233
Name
SSN
123-45-6789
Amanda Winters
Address
City Elgin
40 Bayberry Drive
State IL
 Ensure valid business need to know to sensitive data
 Mask data in real time to respond to suspicious activities
 Promote role based approach to data access
Zip 60123
Mask data in reports
Customer Number 123456
Purchase Order 333-22-4444
Name Erica Schafer
Address 12 Murray Court
City Austin
State TX
Zip 78704
Programmatically
mask
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Monitor
& Audit
CFO Business
reports
Marketing team
reports
Reports for
business partners
Mask data in reports to generate specialized views targeted for different
recipient based on job role or functional area
Statically mask data in non-production
databases
Patient No 123456
SSN 333-22-4444
Name Erica Schafer
Address 12 Murray Court
City Austin
State TX
Zip 78704
Statically mask
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
Monitor
& Audit
Patient No 112233
SSN 123-45-6789
Name Amanda Winters
Address 40 Bayberry Drive
City Elgin
State IL
Zip 60123
 Mask data in non-production databases such as test and development
 Improve security of non-production environments
 Facilitate faster testing processes with accurate test data
 Support referential integrity
 Mask custom and packaged ERP/CRM applications
Propagating Masked Data
Customers Table
Cust ID
Name
08054 Alice Bennett
19101 Carl Davis
27645 Elliot Flynn
Street
2 Park Blvd
258 Main
96 Avenue
Orders Table
Cust ID Item #
27645
80-2382
27645
86-4538
Order Date
20 June 2004
10 October 2005
 Key propagation
–Propagate values in the
primary key to all
related tables
–Necessary to maintain
referential integrity
Masking with Key Propagation
Original Data
De-Identified Data
Customers Table
Cust ID
Name
08054 Alice Bennett
19101 Carl Davis
27645 Elliot Flynn
Street
2 Park Blvd
258 Main
96 Avenue
Orders Table
Cust ID Item #
27645
80-2382
27645
86-4538
Customers Table
Order Date
20 June 2004
10 October 2005
Cust ID
Name
10000 Auguste Renoir
10001 Claude Monet
10002 Pablo Picasso
Referential
integrity is
maintained
Street
Mars23
Venus24
Saturn25
Orders Table
Cust ID Item #
10002
80-2382
10002
86-4538
Order Date
20 June 2004
10 October 2005
IBM InfoSphere Optim Test Data Management Solution
Requirements
Create “right-size”
production-like environments
for application testing
• Create referentially intact,
“right-sized” test databases
• Automate test result
comparisons to identify
hidden errors
• Protect confidential data
used in test, training &
development
• Shorten iterative testing
cycles and accelerate time
to market
Test Data
Management
-Subset
-Mask
-Compare
-Refresh
2TB
Production or
Production Clone
Benefits
25 GB
25 GB
Development
Unit Test
50 GB
100 GB
Integration Test
Training
InfoSphere Optim TDM supports data on distributed platforms (LUW) and z/OS.
Out-of-the-box subset support for packaged applications ERP/CRM solutions as well as :
Other
15
• Deploy new functionality
more quickly and with
improved quality
• Easily refresh & maintain
test environments
• Protect sensitive
information from misuse &
fraud with data masking
• Accelerate delivery of test
data through refresh
Test Data Management and creating a Gold Master
Production Database
1200GB
“Masked” DB
Gold Master
600 GB
Subset
& Mask
• Build all test environments from clone
• Mask data in place on Gold Master
to de-identify
• Subset clone to right-size data
• Compare data with “Gold” to identify
defects
• Refresh test data with “Gold” to get
latest data for testing
Subset/
Compare/
Refresh
Test Database
50 GB
Subset/
Compare/
Refresh
Training Database
75 GB
Subset/
Compare/
Refresh
Dev Database
25 GB
Test Data Management without Gold Master
A/R
Production
Database
900 GB
CRM
Production
Database
1200GB
Test Database
50 GB
Subset/Mask
• Bring together entire business objects
across data sources
• Mask data as moved to non-production
environments
• Subset to right-size data
• Compare data with original to identify defects
• Refresh test data with original to get latest
data for testing
Training Database
75 GB
Dev Database
25 GB
Maximizing business value with InfoSphere Optim
Data Masking – Unique solution capabilities
Information Governance Core Disciplines
Security and Privacy
Understand &
Define
Secure &
Protect
 Support database and application data masking
– Ensures application integrity and database integrity
– Preset pack of masking routines rules as well as the
ability to create customized routines
– Integration into the software development lifecycle
– Support for all leading databases and applications
 Help establish business content for masking
policies
– Support for Information Lifecycle Management projects
– Enterprise-wide rule definition
Monitor
& Audit
Arek Oy
Deploys a pension earnings and accrual system in 30 months
The need:
Pension laws (TyEL) in Finland changed radically in 2007. In response, Arek
Oy had to develop and deliver a tested and reliable Pension Earnings and
Accrual System within 30 months. Arek Oy had to protect confidential
employee salary and pension information in multiple non-production
(development and testing) environments. Failure to satisfy requirements
would result in loss of customer good will and future business opportunities.
The solution:
Using IBM InfoSphere Optim subsetting capabilities rather than cloning large
production databases made it possible for Arek Oy staff to create robust,
realistic test databases that supported faster iterative testing cycles. In
addition, InfoSphere Optim offered proven capabilities for performing
complex data masking routines, while preserving the integrity of the pension
data for development and testing purposes.
The benefits:
•
•
Improved development and testing efficiencies, enabling Arek Oy
to promote faster deployment of new pension application
functionality and enhancements
Protected confidential data to strengthen public confidence and
support TyEL compliance requirements.
“We see Optim as an integral
part of our development
solution set. Optim’s data
masking capabilities help
ensure that we can protect
privacy in our development
and testing environments.”
— Katri Savolainen, Project Manager,
Arek Oy
Solution components:
• IBM InfoSphere Optim Data Masking
Solution
• IBM InfoSphere Optim Test Data
Management Solution
Arek Oy
Case Study
Lawson
Develops compliance process while improving performance
The need:
•
•
•
•
Manage multiple test environments to ensure the highest quality
testing for the lowest possible cost
Adhere to recent legislation on proper use of data in nonproduction
environments including testing, development and QA
Develop an enterprise wide approach for protecting sensitive data—
such as social security numbers, salary information and direct
deposit account numbers
Archive rarely used production data to meet retention requirements
while improving performance
The solution:
The IBM InfoSphere Optim portfolio was used to develop a comprehensive
data management approach including: archiving, sub-setting, masking and
decommissioning to meet compliance mandates all while improving
performance.
The benefits:
•
•
•
•
Provided testing teams with immediate access to data
Streamlined compliance by masking nonproduction data
Improved performance by archiving rarely used data
Established data retention policies to meet compliance requirements
Lawson develops a comprehensive
data management approach to
facilitate application delivery, ensure
compliance and improve
performance. They leveraged the
InfoSphere Optim family of products
to meet their goals.
Solution components:
• IBM InfoSphere Optim Data Growth
Solution
• IBM InfoSphere Optim Test Data
Management Solution
• IBM InfoSphere Optim Data Masking
Solution
Detailed case study
with IBM BP BTRG
Large US Insurance Company
Masks data to support HIPAA compliance
The need:
•
•
•
•
Establish enterprise-wide data privacy rules to ensure HIPAA
compliance
Obfuscate diverse data types including: credit card information,
personal health information and personally identifiable information
Protect data in over 45,000 tables while ensuring the appropriate
relationships are maintained to preserve application logic across
custom and packaged applications
Understand all sensitive data types across a complex,
heterogeneous enterprise no matter where they resides
The solution:
IBM InfoSphere Optim applies a range of masking techniques to transform
sensitive information with both prepackaged data masking routines and
options for customization. InfoSphere Optim transforms complex data
elements while retaining their contextual meaning.
Large US insurance company
drives HIPAA compliance by
masking sensitive data across
the enterprise with IBM
InfoSphere Optim.
Solution components:
• IBM InfoSphere Optim Data
Masking Solution
• IBM Lab Services
The benefits:
•
•
•
Established a single, scalable approach to enterprise data masking
Automatically identified sensitive data across the enterprise
Helped drive HIPAA compliance
Detailed case study with IBM BP BTRG
Success: Data Privacy
About the Client:
$300 Billion Retailer
Largest Company in the World
Largest Informix installation in the world
 Application:
– Multiple interrelated retail transaction
processing applications
 Challenges:
– Comply with Payment Card Industry (PCI)
regulations that required credit card data to be
masked in the testing environment
– Implement a strategy where Personally
Identifiable Information (PII) is de-identified
when being utilized in the application
development process
– Obtain a masking solution that could mask
data across the enterprise in both Mainframe
and Open Systems environments
 Solution:
– IBM Optim Data Privacy Solution™
 Client Value:
– Satisfied PCI requirements by giving
this retailer the capability to mask
credit data with fictitious data
– Masked other PII, such as customer
first and last names, to ensure that
“real data” cannot be extracted from
the development environment
– Adapted an enterprise focus for
protecting privacy by deploying a
consistent data masking methodology
across applications, databases and
operating environments
¡Muchas Gracias!
Narciso Peña
Regional Software Specialist
Tel. (809) 566-5161
E-mail: nepena@gbm.net
Download