Secure DaaS Platform for All of Your

Data

Mike Logan

September, 2015

1

It’s All About the Data – Protect It!

Enterprise has many security vectors being addressed as a high priority

• The scope of vulnerability is very broad and attacks can happen from any direction

• Non-production data can be source of vulnerability

• All production data in non-prod must meet strict production security requirements in a fluid non-production environment designed to drive new business capabilities

• Many different types of disparate data sources secured with different tools and processes

Application teams usually work in silos, but masked data must be used across silos requiring consistency in masked data

© 2015 Delphix. All Rights Reserved. Private & Confidential. 2

Fun Exercise - Data Breach Risk Report

What is your score?

• https://databreach calculator.com

• Yes this is sponsored by a security product vendor so take it with a grain of salt

© 2015 Delphix. All Rights Reserved. Private & Confidential. 3

Data Governance and Security

Organizations need to decrease their surface areas of risk

98%

“DATA AT

RISK” IS IN

DATABASES

© 2015 Delphix. All Rights Reserved. Private & Confidential.

98%

>80%

MOST

DATABASES IN

NON-PROD,

MOST OF THE

USERS ARE IN

NON-PROD

4

What Data Needs to be Protected

 HIPAA - Healthcare and Pharmaceutical are required to secure

Patient Health Information

 PCI DSS : Credit Card Industry Standard

 State privacy laws - All companies must follow their own similar to

Senate Bill No 1386 – State of California

“DATA AT

CUSTOMER PII & PATIENT PHI

 Names, Phone, Email

 Medicaid Number

 Address

• Street address, Zip+4

• Care of…, Attn: ...

 SSN or other national identifier

 Birth date and other dates

 Credit card #, bank account #

 Comment fields

Customer ID

 Internal sequence keys

Gramm-Leach-Bliley Financial Services Modernization Act (1999)

Sarbanes-Oxley Act (2002)

CANADA : Jan 2005 – Personal Information Protection and

Electronic Documents Act

JAPAN : Apr 2005 – Personal Information Protection Law

DATABASES

Salary, Benefits

 HR status

(termination, personnel issues)

 Family data

 Manager information

Cost Center data

COMPANY SECRETS

 Pricing, M&A, Contracts

Confidential/Top Secret

 Provider Contracts

 Actuarial Calculations

 Security Identifiers CUSIP, ISIN,

SEDOL

 trade date

 Financials

Price, quantity, legal fees, vendor payments

 Assets/holdings

© 2015 Delphix. All Rights Reserved. Private & Confidential. 5

How to Control Your Data Asset

PROD PROD-

Like

UAT QA

DATA MASKING

SIT DEV

Lockdown

No Persistent Access

Emergency Access Controls

Activity Monitoring

Periodic Entitlements Reviews

Secure Workspace, Disposal, and Data Erasure

Strong Passwords and Segregation of Duties

• The other controls listed here provide compensating controls in production and any environments where masking cannot be used

© 2015 Delphix. All Rights Reserved. Private & Confidential. 6

Profiler: Find your Sensitive Data Assets

A system capable of identifying sensitive data elements (HIPAA, Names,

Address, SSN, etc.) in:

• Databases ( Oracle, SQLServer, DB2 and many more)

• Files (Mainframe, XML, CSV, EDI, Office files etc.)

• Unstructured Data, think of doctor’s notes in electronic medical records

Before: CISO “I have 6 critical systems which may have sensitive data.”

After: CISO, “I have actionable knowledge: Database for application X has

• Social Security Numbers (5 instances)

• Credit Card Numbers (2 instances)

• First Names (5 instances), etc.

© 2015 Delphix. All Rights Reserved. Private & Confidential. 7

Data Masking = Manage Your Sensitive Data Risk

Masking replaces sensitive data consistently and automatically in non-production environments across the enterprise with fictitious but realistic data to eliminate the risk of exposure to unauthorized parties.

QA TEST DEV

John

Smith

#339-54-8234

5-12-1975

Mark

Stevens

#459-14-3334

4-09-1977

TRAINING BI

Sensitive data is masked as it is moved downstream

Production Non-Production

© 2015 Delphix. All Rights Reserved. Private & Confidential. 8

You Need Data Masking When You:

• Copy sensitive data outside of production environments

• Migrate to the Cloud ( Amazon, Azur , others…)

Leverage off-shore development/consultants

Send data to partners or vendors

• Need regulatory compliance (PCI DSS, HIPAA etc.)

• Respond to that pesky audit item

© 2015 Delphix. All Rights Reserved. Private & Confidential. 9

Why can’t I just use Encryption or Tokenization?

Definition: Encryption is the process of encoding data in such a way that only the authorized parties can read it.

Pros: Great for sending data between two parties such as email or files. Also used for protecting data on your hard drive.

© 2015 Delphix. All Rights Reserved. Private & Confidential.

Cons: Terrible for non-production . The most common way a hacker accesses a system is getting the credentials of a user (phishing or social engineering), and becomes an authorized party.

10

How to Maintain Referential Integrity Automatically

Deterministic algorithms masks data based on the input data. Repeatable masking automatically maintains Referential Integrity, even if it’s between applications or platforms – even if you don’t know RI exists:

Sample Masking: DEUTSCHE BANK becomes STANDARD OIL

 Lets take “DEUTSCHE BANK”

• Encrypt with AES 256 “ lGqll597aX2C3bBVMJ3uIg== ”

Hash value of the encrypted output is

428618117

• 428618117 mod 500 = 17

Lookup table has a sequence and a value. 17 is

“STANDARD OIL”

• “DEUTSCHE BANK” becomes “STANDARD OIL”

File RDBMS

Deterministic Algorithms

STANDARD OIL STANDARD OIL

© 2015 Delphix. All Rights Reserved. Private & Confidential. 11

Goal - Mask without programming.

Mask any data, in any language, without thinking about the data technology, data security, or how to create consistency between data. Maintain syntax exactly. Maintain semantics with fictitious data.

Data Masking – 5 step

Repeatable Process

© 2015 Delphix. All Rights Reserved. Private & Confidential. 12

Data Masking Process

A masking policy is based on the principle that sensitive data needs to be identified, monitored, masked, and audited.

Experience has shown that a process perspective is extremely important to improve efficiency and will result in a consolidated masking policy integrated across your enterprise. The use of

Delphix Masking in conjunction with your data masking policy will help institutionalize it and ensure access appropriate to role is enforced.

Delphix Masking enables standardization on a single toolset as an important step in process improvement:

• Delphix Masking is designed to support your data masking policy process not force your policy to follow the tool

© 2015 Delphix. All Rights Reserved. Private & Confidential. 13

Masking Maturity Model

Used as a guide to higher levels of quality, the maturity model can lead to far-reaching improvements in the efficiency and effectiveness of the data security program.

• Level 1 – Sensitive Data Chaos

There is no sensitive data policy, limited knowledge about its whereabouts, and how to protect it

• Level 2 – Sensitive Data Awareness

The people, processes and tools used to mask and protect sensitive data are evolving. These are reactionary and produce unpredictable results.

One-off initiatives have begun to inventory and mask data. Masking scripts have been written.

• Level 3 – Sensitive Data Understood

The enterprise has formalized and disseminated a data masking policy and the organizations, processes, training, and tools needed for protecting sensitive data are based on the policy

• Level 4 – Repeatable Sensitive Data Masking

Processes are in place and tools for inventorying, masking, provisioning, monitoring, and auditing sensitive data are uniformly used across the enterprise and consistently produce high quality results.

• Level 5 – Sensitive Data Proactively Masked and Managed

User provisioning automatically provides entitlements to sensitive data for those users with a need to know. Monitored databases provide automatic logging and alerts to the ISO of breeches to this policy.

14 © 2015 Delphix. All Rights Reserved. Private & Confidential.

Typical Reactions to Data Masking

(with apologies to Kubler-Ross):

• [Denial and Isolation]

• [

[Anger]

Bargaining ]

[Depression]

[Acceptance]

• "I don ’t have any sensitive data."

– while some systems obviously contain sensitive data we typically find a lot more than clients expect. The better they are at data sharing the more risk data is everywhere.

• "You're going to break my referential integrity!

– no we don’t break it, in fact the right algorithms and a repeatable process make this problem disappear.

• "This environment is just like Prod – can’t I fill out an exception?“

Masking is a risk management tool, exceptions might be good short term but should not become the rule.

• "This doesn ’t work! Now our project is going to be late because of you data masking people."

Data masking, like any security tool needs to be deployed in an organized manner and the benefits will out weigh the cost.

• "I guess if you've already done this to 300 other environments, you can do it to ours..."

Once people see that masking secures their data and virtualization allows them instant data self service, why would they ever go back?

© 2015 Delphix. All Rights Reserved. Private & Confidential. 15

Delphix Data Protection Checklist

Center of Excellence Type

 Best Practice

 Technical Standard

 Shared Services

 Central Service

Keys

 Executive support

 Big Program

 “Like an app”

 Communication

 Progress

Masking Models

 In place

 On the fly

 Pre and Post

 End to end

 Standards

COE Phase

 Initiate

 Institutionalize

 Scale

 Sustain

© 2015 Delphix. All Rights Reserved. Private & Confidential.

Challenges

 Accountability

 Funding

 Timeframe

 Support

Operational

 Automation

 SLA ’s

 Change Control

 Validation

 DR

Organization

 Application Groups

 Infrastructure + Operations

 QA and Testing

 DMsuite Team

 Architecture

Planning

 Development

 Deployment

Scale and Scope

 Size

 Technology Coverage

 Language

 Legal and Regulatory

Topology

 HW

 Network

16

Recommended Deployment

Create a small core group (3 - 5 ) of resources with experience using masking tools and techniques to assist/support application teams.

COE

Project

Management

Office

Project

Planning

Delphix Masking

Center of Excellence

Post-Masking

Validation

Post-Masking

Validation Process

Additional Masking

Models

Additional Algorithms

Delphix Masking

Process

Expansion of COE Development

© 2015 Delphix. All Rights Reserved. Private & Confidential. 17

Solution Architecture

PRODUCTION

NETWORK

Agile Masking

Child Copies

1-n

> Agile Masking

Gold Copy

JetStream

PROD

= Refresh VDB

© 2015 Delphix. All Rights Reserved. Private & Confidential.

STANDBY

Mission Control

Audit Reporting

NON - PRODUCTION

NETWORK

• Delphix Admin creates initial unmasked VDB

• Masking Admin uses Masking UI to run profiler, setup masking rules and create masking job

• Delphix Admin masks VDB (Gold

Copy) by calling masking job

• Delphix Admin creates masked child

VDB’s from gold copy

• Each Child Copy is assigned to a

JetStream user by Delphix Admin.

• Gold Copy can be refreshed from

Standby on a schedule. Fresh data is masked as part of refresh

• JetStream user can refresh child copies on demand and get latest masked data from Gold Copy.

18

Mask and Provision Data Instantly = Secure DaaS

PRODUCTION

NETWORK 10:27:36 A.M.

1:30:20 P.M.

5:07:15 P.M.

NON- PRODUCTION

NETWORK

Replication

Masked Gold Copy VDB >

Sync

SFTP, API, JDBC,

HDFS

Masked Virtual 1-n

Mainframe

Etc.

Cloud

RDBMS

Etc

.

© 2015 Delphix. All Rights Reserved. Private & Confidential.

Etc

.

Files

MS Office

Etc.

Masked Physical 1-n

Key

Virtualize

ETL

Physical

Prod

Physical

Masked

Virtual

19

Masked

Refresh

VDB

Power Over Data

20

Solution Architecture

PRODUCTION

NETWORK Agile Masking

Child Copies

1-n

>

Agile Masking

Gold Copy

JetStream

PROD/STANDBY

= Refresh VDB

© 2015 Delphix. All Rights Reserved. Private & Confidential.

Replication

NON - PRODUCTION

NETWORK

• Delphix Admin creates initial unmasked VDB

• Masking Admin uses Masking UI to run profiler, setup masking rules and create masking job

• Delphix Admin masks VDB (Gold

Copy) by calling masking job

• Delphix Admin creates masked child

VDB ’s from gold copy

• Each Child Copy is assigned to a

JetStream user by Delphix Admin.

• Gold Copy can be refreshed from

Prod/Standby on a schedule. Fresh data is masked as part of refresh

• JetStream user can refresh child copies on demand and get latest masked data from Gold Copy.

21

Certify: Monitor Risk in Non-Production

• Service reads the data in non-production and verifies the data is masked. If not, alerts the security staff via email.

• This automatic auditing service measures the adherence to the security policy and identifies non-compliance via an audit trail.

• The audit trail is available via the product interface and PDF reports

• Often used as part of an internal or external audit

© 2015 Delphix. All Rights Reserved. Private & Confidential. 22

Delphix at a Glance

Enterprise software (on premise and cloud): radically improves data delivery & security of data

Virtualizes data inside databases, data warehouses, applications and files

Continuously collects data from apps, versions all changes, and shares data blocks

Virtual data: 1/10 th space of physical copies, 1/100 th delivery time (minutes vs. months)

Accelerates business critical application projects by 50% on average

Founded in 2008, HQ in Menlo Park, California, with offices around the world

Investors Select Customers Select Awards

CEO OF THE YEAR ┃ 2013

© 2015 Delphix. All Rights Reserved. Private & Confidential. 23

Data Masking: Performance – Scale Vertically with Threads)

Agile Masking

Per Table Connection Pool

Thread 1

Read (Defaul 50K rows)

Thread 2

Update (Default 10K rows)

Physical

Connections ad Re

Database

Thread 3

Thread 4

Thread 5

Update

Thread 6

Thread N

© 2015 Delphix. All Rights Reserved. Private & Confidential. 24

Data Masking: Performance

– Scale Vertically with Streams

Customer

3

Accounts

Trades

2

Customer

Trades

Accounts

1

Customer Accounts

© 2015 Delphix. All Rights Reserved. Private & Confidential.

TIME

Trades * Width = Number of Rows

25

Data Masking: Performance – Scale Horizontally

Delphix Copy of Production Data (Unmasked)

(e.g. 10TB)

Agile Masking

Master Node e.g. 4 TB

Masking

Engine1 e.g. 1 TB

Masking

Engine 2 e.g. 1 TB

Masking

Engine3 e.g. 1 TB

Masking

Engine 4 e.g. 1 TB

Masking

Engine 5 e.g. 1 TB

Masking

Engine 6 e.g. 1 TB

Engines can be deployed by data center, by database technology, by business function, by table etc..

Masked Data Repository

Gold Copy

© 2015 Delphix. All Rights Reserved. Private & Confidential. 26