SlideShare a Scribd company logo
1 of 22
ELIMINATING COMPLINCE RISKS DATA MASKING WITH AZURE
SECURITY THREATS
INTENTIONAL (FRAUD)
Ponemon institute study of 60 large organizations
Cost of cybercrime rose 26% to 11.6 Mil per company
The most costly:
• Distributed Denial of Service (DDS)
• Web-based attacks
• Malicious Insiders
SEI Study
Of the 80 of internal fraud cases, 34 % involved Personally Identifiable
Information

UNINTENTIONAL
Innocent insider is being set up by outsider with malicious code
Insider negligence or accidental disclosure ( loss of laptop)
The theft of an unencrypted laptop from an employee's car resulted
in a breach affecting more than 61,000 patients in 2010 in Cincinnaty
22.01.2014

Data courtesy of www.inforisktoday.com

Hush Hush

info@mask-me.net

213.631.1854

2
IT RESPONDS BY TIGHTENING
SECURITY
Separation of environments
Tightened controls
Standards, policies, audits, drills, security framework
Due to increased security processes, development slows down

DEVELOPMENT LOOKS SOMEWHERE ELSE :
CLOUD = EASY PROVISIONNING = SPEED TO MARKET
SECURI
TY

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

3
IS CLOUD RISK FREE?
Avoiding The Hidden Costs of The Cloud (Symantec)
Of 3,236 companies :
40% exposed confidential info
25% suffered account takeover and digital theft
40% loss of data
23% fined for privacy violation

IT
RESTRICTIONS

22.01.2014

PRESSURE TO
DEVELOP AT
BREAKNECK
SPEED

Hush Hush

PUBLIC CLOUD
BECOMES
DEVELOPMENT
SANDBOX

info@mask-me.net

SECURTY
BREACHES IN
CLOUD –SLAs

213.631.1854

HOW DO WE
PROTECT
DATA?

4
DOES IT MEAN WE SHOULD AVOID
CLOUD DEVELOPMENT?

LETS TAKE A CLOSER LOOK AT DEVELOPMENT
PROCESSES AND
DATA FLOWS ACROSS ENVIRONMENTS
22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

5
BIG PICTURE : DIFFERENT
COMPANIES –DIFFERENT NEEDS
STARTUP
There is no data in organization. Development speed is
high. Developers create their own data with “insert”
statements.

0

DEVELOPED ORGANIZATION
Data in other systems and in production. It is used to
populate development environments. Speed of
development slows down.
New Projects – add files and data feeds
Continuous Development – adds its own production data
Maintenance – no new features, no “inserts” any more
Migration – only production data, moving on

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

6
NEW DEVELOPMENT
When we start from Scratch, there is
nothing and we can initially treat
everything as if databases were code.
Your
Application

Your
Database
Copyright 2005 / Scott W. Ambler

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

7
NEW DEVELOPMENT
We create data with “INSERT” statements, saving them as code in Source Control.
Cloud – no Cloud makes no difference.
Yes, promote to production
Yes, promote to Staging
Yes, promote to the QA

SANDBOX:
Create master data
and test cases. test

NO
errors?

QA:
Move new master
data Run test
cases

NO
errors?

Staging / UAT:
Move New Master data,
test for deployment
Do UAT

NO
errors?

Production
Now, users
are “testers”

Create a DDL and
DML script in the
source control
CLEAR ALL THE TEST CASES LEAVE MASTER DATA
ERRORS
ERRORS
ERRORS

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

8
TO INFINITY AND BEYOND : IN
PRODUCTION
Big day being behind, we are in production
•
•

•

•

Lots of transactions
Database size reaches GB, TB, PT –
think Amazon, we all want our
business be there
We scale in various ways, yet the
CRUD logic is the same
Master data matures and gets into
DB via GUI
WE BECOME THE
“DEVELOPED ORGANIZATION”
WITH EXISTING SYSTEMS
AND CONTINUOUS DEVELOPMENT

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

9
THE USUAL WAY OF DOING DATA
CYCLE
Transactional
Data

Yes, promote to production

Master
Data

Yes, promote to Staging
Yes, promote to the QA

SANDBOX:
Create master data
and test cases. test

NO
errors?

Create a DDL script
in the source
control Create DML
Scripts - optional

QA:
Move new
master data
Run test cases

NO
errors?

Staging/UAT:Move New
Master data, test for
deployment Do UAT

NO
errors?

DATABASE

Production
Now, users
are “testers”

ERRORS

Back Up

CLEAR ALL THE TEST CASES LEAVE MASTER DATA

ERRORS

BACK UP

ERRORS

Truncate
Transactional
Data

22.01.2014

Hush Hush

info@mask-me.net

BACK UP
with Reduced
data set

213.631.1854

Mask
Sensitive Data

Apply code

10
NEW DEVELOPMENT – EXISTING
ORGANIZATION
PRODUCTION
SYSTEMS

DIFFERENCE

ETL
MASK

Yes, promote to production
Yes, promote to Staging
Yes, promote to the QA

SANDBOX:
Create master data
and test cases. test

NO
errors?

QA:
Move new master
data Run test
cases

NO
errors?

Staging / UAT:
Move New Master
data, test for
deployment
Do UAT

Create a DDL and
DML script in the
source control

NO
errors?

Production
Now, users
are “testers”

CLEAR ALL THE TEST CASES LEAVE MASTER DATA
ERRORS
ERRORS
ERRORS

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

11
WE NEED TO MASK BEFORE WE
DEVELOP !
BUMMER!
COMPLIANCE!!!

SO WHAT IS THE CATCH?
MASKING IS DEVELOPMENT ACTIVITY AND TAKES TIME
THAT IS WHY IT IS OFTEN “FORGOTTEN” IN THE BEGINNING OF THE
CYCLE, MAKING YOUR ORGANIZATION INSTANTLY NON-COMPLIANT
CURRENT SOLUTIONS USUALLY WORK ON A GOLDEN DB COPY OF
EXISTING SYSTEMS
22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

12
SOLUTION :: YET ANOTHER WAY ::
MASKING IN ETL
PRODUCTION SYSTEMS
ETL
MASK

Transactional
Data

Yes, promote to production
Yes, promote to Staging

Master
Data

Yes, promote to the QA

Create a DDL
script in the
source control
Create DML
Scripts - optional

SANDBOX:
Create master data
and test cases. test

NO
errors?

QA:
Move new
master data
Run test cases

NO
errors?

Staging/UAT:Move
New Master
data, test for
deployment Do UAT

NO
errors?

DATABASE

Production
Now, users
are “testers”
ERRORS

Get Delta

CLEAR ALL THE TEST CASES LEAVE MASTER DATA

ERRORS

ETL Package
ERRORS

Move Staging

Move To Sandbox

Mask Sensitive
Data

Move To QA
Apply a Transform
To Accommodate
DDL change

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

13
YET ANOTHER WAY : ETL
SLA constraints on backup/load – you might not have priviledge
with your provider
You need instant deltas of production data for development
You have ETL already established
You want masking be part of your already established ETL
• Requirements of GLBA, HIPAA, PSS/DSA
• Part of SDLC in Relational and in BI, with transforms
• Files
• Feeds from other production systems
Benefits of HushHush
• No significant upfront investment
• No learning curve
• Part of development toolbox
22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

14
ETL WITH AZURE

AZURE

FILES

DATABASE

FTP

VM

ETL
MASK

ETL
MASK

VM

DATABASE
STORAGE

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

15
DATA FLOW WITH ETL MASKING
EXAMPLE

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

16
PERILS OF ENVIRONMENTS:
DATA HOMOGNEITY ACROSS
ENVIRONMENTS
•

How close should environments be in terms of data?

SANDBOXAND INTEGRATION
ENVIRONMENTS
•

•

•

hold the least amount of data. A rule of thumb: data set
sufficient enough for developing functional requirements.
Pros: speeds up development, cons: can’t accommodate all
the test cases and needs constant data set assessments.
The QA/Staging should hold complete data set to allow for
UAT and for performance and regression testing.
Break Fix environment holds data set and schema as close
to production as possible to allow for speedy production
issues resolutions.

22.01.2014
Hush Hush
info@mask-me.net
PHYSICAL CONSTRAINTS

213.631.1854

17
PERILS OF ENVIRONMENTS CONT.:
ENVIRONMENT SLAs
is development around the clock with international development team,
24/7 or only happens in one place with 8 hours development day/time?

RATE OF REFRESHES
depends on whether we do continuous deployments or scheduled releases

DATA RETENTION
how much and often transactional data gets purged?

SCHEMA MANAGEMENT
Schema/data in source control? Are deployments automated including data?
Are there specific structures that support metadata?

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

18
DATA LOAD SOLUTION STRATEGIES
CONSTRAINTS
Operational requirements for
• data availability
• data consistency
• performance
• data integrity

ARCHITECTURAL
PATTERNS
•
•

Backup/Load
ETL Solutions (different kinds)

IN-CLOUD PATTERN - NEW
• VM Provisioning/IMAGE

Development Requirements for:
• development time
• skill sets
Environmental
• Monetary (space and
processors)
• Political (we just do not want to
use third party)
22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

19
QA/STAGING/BREAK FIX
ENVIRONMENTS

BE AWARE !
Backup/Load takes time. Count on it.
Refactoring takes time. Count on it.
ETL takes time. Count on it.
Masking has its own architectures.
Chose the one appropriate.

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

20
USED TOOLS AND OTHER TOOLS
THAT HELP
What I used:
SQL Server, SSMS, SSIS, Data Quality Services, TFS, VS, Visio
If you do not have VS and TFS:
• Red Gate: SQL Compare, SQL Data Compare,SQL Data Generator, SQL
Source Control
• Embarcadero: E/R Studio, DB Change Manager

Masking:
HUSHHUSH Masking components for ETL architectures (http://mask-me.net)

22.01.2014

Hush Hush

info@mask-me.net

213.631.1854

21
Data masking - addressing PII exposure risks in the cloud

More Related Content

What's hot

DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesSi Nahra
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for InsuranceNIIT Technologies
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Blancco
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesAvritek
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 

What's hot (20)

Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehouses
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best Practices
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 

Viewers also liked

Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Splunk
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceCapgemini
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Informatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionYolanta Beresna
 
Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Antonios Chatzipavlis
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud
 
Informatica Products and Usage
Informatica Products  and UsageInformatica Products  and Usage
Informatica Products and UsageBigClasses Com
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...CA Technologies
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)Amazon Web Services
 

Viewers also liked (13)

Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Informatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release Webinar
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
 
Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Dynamic data masking sql server 2016
Dynamic data masking sql server 2016
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Informatica Products and Usage
Informatica Products  and UsageInformatica Products  and Usage
Informatica Products and Usage
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
 

Similar to Data masking - addressing PII exposure risks in the cloud

5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based TestingTurnKey Solutions
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Balance agility and governance with #TrueDataOps and The Data Cloud
Balance agility and governance with #TrueDataOps and The Data CloudBalance agility and governance with #TrueDataOps and The Data Cloud
Balance agility and governance with #TrueDataOps and The Data CloudKent Graziano
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive eraIBM Analytics
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsRyan Gross
 
Virtual Data : Eliminating the data constraint in Application Development
Virtual Data :  Eliminating the data constraint in Application DevelopmentVirtual Data :  Eliminating the data constraint in Application Development
Virtual Data : Eliminating the data constraint in Application DevelopmentKyle Hailey
 
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...Curiosity Software Ireland
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA
 
Microsoft Azure - Conceptos Basicos
Microsoft Azure - Conceptos BasicosMicrosoft Azure - Conceptos Basicos
Microsoft Azure - Conceptos BasicosMauricioPenagos4
 
What it takes to bring Hadoop to a production-ready state
What it takes to bring Hadoop to a production-ready stateWhat it takes to bring Hadoop to a production-ready state
What it takes to bring Hadoop to a production-ready stateClouderaUserGroups
 
AWS Summit Singapore - Architectures in the Cloud Era
AWS Summit Singapore - Architectures in the Cloud EraAWS Summit Singapore - Architectures in the Cloud Era
AWS Summit Singapore - Architectures in the Cloud EraAmazon Web Services
 
Capgemini Leap Data Transformation Framework with Cloudera
Capgemini Leap Data Transformation Framework with ClouderaCapgemini Leap Data Transformation Framework with Cloudera
Capgemini Leap Data Transformation Framework with ClouderaCapgemini
 
Data Vault 2.0 Demystified: East Coast Tour
Data Vault 2.0 Demystified: East Coast TourData Vault 2.0 Demystified: East Coast Tour
Data Vault 2.0 Demystified: East Coast TourWhereScape
 
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...Hortonworks
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Precisely
 
e-IT exec lunch - "It's all about data" - 25 May '16
e-IT exec lunch - "It's all about data" - 25 May '16e-IT exec lunch - "It's all about data" - 25 May '16
e-IT exec lunch - "It's all about data" - 25 May '16Devin Deen
 

Similar to Data masking - addressing PII exposure risks in the cloud (20)

5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Balance agility and governance with #TrueDataOps and The Data Cloud
Balance agility and governance with #TrueDataOps and The Data CloudBalance agility and governance with #TrueDataOps and The Data Cloud
Balance agility and governance with #TrueDataOps and The Data Cloud
 
Unlocking the Potential of Database Automation
Unlocking the Potential of Database AutomationUnlocking the Potential of Database Automation
Unlocking the Potential of Database Automation
 
Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data ops
 
Virtual Data : Eliminating the data constraint in Application Development
Virtual Data :  Eliminating the data constraint in Application DevelopmentVirtual Data :  Eliminating the data constraint in Application Development
Virtual Data : Eliminating the data constraint in Application Development
 
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...
Curiosity and EPI-USE Labs present - Testing across SAP and non-SAP systems: ...
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
 
Microsoft Azure - Conceptos Basicos
Microsoft Azure - Conceptos BasicosMicrosoft Azure - Conceptos Basicos
Microsoft Azure - Conceptos Basicos
 
What it takes to bring Hadoop to a production-ready state
What it takes to bring Hadoop to a production-ready stateWhat it takes to bring Hadoop to a production-ready state
What it takes to bring Hadoop to a production-ready state
 
AWS Summit Singapore - Architectures in the Cloud Era
AWS Summit Singapore - Architectures in the Cloud EraAWS Summit Singapore - Architectures in the Cloud Era
AWS Summit Singapore - Architectures in the Cloud Era
 
Capgemini Leap Data Transformation Framework with Cloudera
Capgemini Leap Data Transformation Framework with ClouderaCapgemini Leap Data Transformation Framework with Cloudera
Capgemini Leap Data Transformation Framework with Cloudera
 
Data Vault 2.0 Demystified: East Coast Tour
Data Vault 2.0 Demystified: East Coast TourData Vault 2.0 Demystified: East Coast Tour
Data Vault 2.0 Demystified: East Coast Tour
 
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
C-BAG Big Data Meetup Chennai Oct.29-2014 Hortonworks and Concurrent on Casca...
 
OpenDevOps 2019 - Disconnected pipelines the missing link
OpenDevOps 2019 - Disconnected pipelines the missing linkOpenDevOps 2019 - Disconnected pipelines the missing link
OpenDevOps 2019 - Disconnected pipelines the missing link
 
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
Digital Transformation: How to Run Best-in-Class IT Operations in a World of ...
 
e-IT exec lunch - "It's all about data" - 25 May '16
e-IT exec lunch - "It's all about data" - 25 May '16e-IT exec lunch - "It's all about data" - 25 May '16
e-IT exec lunch - "It's all about data" - 25 May '16
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Data masking - addressing PII exposure risks in the cloud

  • 1. ELIMINATING COMPLINCE RISKS DATA MASKING WITH AZURE
  • 2. SECURITY THREATS INTENTIONAL (FRAUD) Ponemon institute study of 60 large organizations Cost of cybercrime rose 26% to 11.6 Mil per company The most costly: • Distributed Denial of Service (DDS) • Web-based attacks • Malicious Insiders SEI Study Of the 80 of internal fraud cases, 34 % involved Personally Identifiable Information UNINTENTIONAL Innocent insider is being set up by outsider with malicious code Insider negligence or accidental disclosure ( loss of laptop) The theft of an unencrypted laptop from an employee's car resulted in a breach affecting more than 61,000 patients in 2010 in Cincinnaty 22.01.2014 Data courtesy of www.inforisktoday.com Hush Hush info@mask-me.net 213.631.1854 2
  • 3. IT RESPONDS BY TIGHTENING SECURITY Separation of environments Tightened controls Standards, policies, audits, drills, security framework Due to increased security processes, development slows down DEVELOPMENT LOOKS SOMEWHERE ELSE : CLOUD = EASY PROVISIONNING = SPEED TO MARKET SECURI TY 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 3
  • 4. IS CLOUD RISK FREE? Avoiding The Hidden Costs of The Cloud (Symantec) Of 3,236 companies : 40% exposed confidential info 25% suffered account takeover and digital theft 40% loss of data 23% fined for privacy violation IT RESTRICTIONS 22.01.2014 PRESSURE TO DEVELOP AT BREAKNECK SPEED Hush Hush PUBLIC CLOUD BECOMES DEVELOPMENT SANDBOX info@mask-me.net SECURTY BREACHES IN CLOUD –SLAs 213.631.1854 HOW DO WE PROTECT DATA? 4
  • 5. DOES IT MEAN WE SHOULD AVOID CLOUD DEVELOPMENT? LETS TAKE A CLOSER LOOK AT DEVELOPMENT PROCESSES AND DATA FLOWS ACROSS ENVIRONMENTS 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 5
  • 6. BIG PICTURE : DIFFERENT COMPANIES –DIFFERENT NEEDS STARTUP There is no data in organization. Development speed is high. Developers create their own data with “insert” statements. 0 DEVELOPED ORGANIZATION Data in other systems and in production. It is used to populate development environments. Speed of development slows down. New Projects – add files and data feeds Continuous Development – adds its own production data Maintenance – no new features, no “inserts” any more Migration – only production data, moving on 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 6
  • 7. NEW DEVELOPMENT When we start from Scratch, there is nothing and we can initially treat everything as if databases were code. Your Application Your Database Copyright 2005 / Scott W. Ambler 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 7
  • 8. NEW DEVELOPMENT We create data with “INSERT” statements, saving them as code in Source Control. Cloud – no Cloud makes no difference. Yes, promote to production Yes, promote to Staging Yes, promote to the QA SANDBOX: Create master data and test cases. test NO errors? QA: Move new master data Run test cases NO errors? Staging / UAT: Move New Master data, test for deployment Do UAT NO errors? Production Now, users are “testers” Create a DDL and DML script in the source control CLEAR ALL THE TEST CASES LEAVE MASTER DATA ERRORS ERRORS ERRORS 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 8
  • 9. TO INFINITY AND BEYOND : IN PRODUCTION Big day being behind, we are in production • • • • Lots of transactions Database size reaches GB, TB, PT – think Amazon, we all want our business be there We scale in various ways, yet the CRUD logic is the same Master data matures and gets into DB via GUI WE BECOME THE “DEVELOPED ORGANIZATION” WITH EXISTING SYSTEMS AND CONTINUOUS DEVELOPMENT 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 9
  • 10. THE USUAL WAY OF DOING DATA CYCLE Transactional Data Yes, promote to production Master Data Yes, promote to Staging Yes, promote to the QA SANDBOX: Create master data and test cases. test NO errors? Create a DDL script in the source control Create DML Scripts - optional QA: Move new master data Run test cases NO errors? Staging/UAT:Move New Master data, test for deployment Do UAT NO errors? DATABASE Production Now, users are “testers” ERRORS Back Up CLEAR ALL THE TEST CASES LEAVE MASTER DATA ERRORS BACK UP ERRORS Truncate Transactional Data 22.01.2014 Hush Hush info@mask-me.net BACK UP with Reduced data set 213.631.1854 Mask Sensitive Data Apply code 10
  • 11. NEW DEVELOPMENT – EXISTING ORGANIZATION PRODUCTION SYSTEMS DIFFERENCE ETL MASK Yes, promote to production Yes, promote to Staging Yes, promote to the QA SANDBOX: Create master data and test cases. test NO errors? QA: Move new master data Run test cases NO errors? Staging / UAT: Move New Master data, test for deployment Do UAT Create a DDL and DML script in the source control NO errors? Production Now, users are “testers” CLEAR ALL THE TEST CASES LEAVE MASTER DATA ERRORS ERRORS ERRORS 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 11
  • 12. WE NEED TO MASK BEFORE WE DEVELOP ! BUMMER! COMPLIANCE!!! SO WHAT IS THE CATCH? MASKING IS DEVELOPMENT ACTIVITY AND TAKES TIME THAT IS WHY IT IS OFTEN “FORGOTTEN” IN THE BEGINNING OF THE CYCLE, MAKING YOUR ORGANIZATION INSTANTLY NON-COMPLIANT CURRENT SOLUTIONS USUALLY WORK ON A GOLDEN DB COPY OF EXISTING SYSTEMS 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 12
  • 13. SOLUTION :: YET ANOTHER WAY :: MASKING IN ETL PRODUCTION SYSTEMS ETL MASK Transactional Data Yes, promote to production Yes, promote to Staging Master Data Yes, promote to the QA Create a DDL script in the source control Create DML Scripts - optional SANDBOX: Create master data and test cases. test NO errors? QA: Move new master data Run test cases NO errors? Staging/UAT:Move New Master data, test for deployment Do UAT NO errors? DATABASE Production Now, users are “testers” ERRORS Get Delta CLEAR ALL THE TEST CASES LEAVE MASTER DATA ERRORS ETL Package ERRORS Move Staging Move To Sandbox Mask Sensitive Data Move To QA Apply a Transform To Accommodate DDL change 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 13
  • 14. YET ANOTHER WAY : ETL SLA constraints on backup/load – you might not have priviledge with your provider You need instant deltas of production data for development You have ETL already established You want masking be part of your already established ETL • Requirements of GLBA, HIPAA, PSS/DSA • Part of SDLC in Relational and in BI, with transforms • Files • Feeds from other production systems Benefits of HushHush • No significant upfront investment • No learning curve • Part of development toolbox 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 14
  • 16. DATA FLOW WITH ETL MASKING EXAMPLE 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 16
  • 17. PERILS OF ENVIRONMENTS: DATA HOMOGNEITY ACROSS ENVIRONMENTS • How close should environments be in terms of data? SANDBOXAND INTEGRATION ENVIRONMENTS • • • hold the least amount of data. A rule of thumb: data set sufficient enough for developing functional requirements. Pros: speeds up development, cons: can’t accommodate all the test cases and needs constant data set assessments. The QA/Staging should hold complete data set to allow for UAT and for performance and regression testing. Break Fix environment holds data set and schema as close to production as possible to allow for speedy production issues resolutions. 22.01.2014 Hush Hush info@mask-me.net PHYSICAL CONSTRAINTS 213.631.1854 17
  • 18. PERILS OF ENVIRONMENTS CONT.: ENVIRONMENT SLAs is development around the clock with international development team, 24/7 or only happens in one place with 8 hours development day/time? RATE OF REFRESHES depends on whether we do continuous deployments or scheduled releases DATA RETENTION how much and often transactional data gets purged? SCHEMA MANAGEMENT Schema/data in source control? Are deployments automated including data? Are there specific structures that support metadata? 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 18
  • 19. DATA LOAD SOLUTION STRATEGIES CONSTRAINTS Operational requirements for • data availability • data consistency • performance • data integrity ARCHITECTURAL PATTERNS • • Backup/Load ETL Solutions (different kinds) IN-CLOUD PATTERN - NEW • VM Provisioning/IMAGE Development Requirements for: • development time • skill sets Environmental • Monetary (space and processors) • Political (we just do not want to use third party) 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 19
  • 20. QA/STAGING/BREAK FIX ENVIRONMENTS BE AWARE ! Backup/Load takes time. Count on it. Refactoring takes time. Count on it. ETL takes time. Count on it. Masking has its own architectures. Chose the one appropriate. 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 20
  • 21. USED TOOLS AND OTHER TOOLS THAT HELP What I used: SQL Server, SSMS, SSIS, Data Quality Services, TFS, VS, Visio If you do not have VS and TFS: • Red Gate: SQL Compare, SQL Data Compare,SQL Data Generator, SQL Source Control • Embarcadero: E/R Studio, DB Change Manager Masking: HUSHHUSH Masking components for ETL architectures (http://mask-me.net) 22.01.2014 Hush Hush info@mask-me.net 213.631.1854 21