Title: Securing Enterprise Data
1Securing Enterprise Data
- September 13th, 2007
- Farhan Mohammad Sr. Sales Engineer
2Introduction to Applimation
- Data growth management software company
- Focus on enterprise applications
- Unified, integrated product suite
- Founded in 1998
- 150 customers using Informia Solutions
3Presentation Agenda
- Overview of data privacy
- Definitions
- Terminology
- Use cases/business drivers for data masking
- Production/non-production?
- Motivations
- Data privacy solution best practices
- Functionality
- Features
4What is Data Privacy?
- Data privacy refers to the evolving relationship
between technology and the legal right to, or
expectation of, privacy in the collection and
sharing of data.
5Sensitive Information Definition
- Non-public private information (NPPI) details
about an individual - Information protected by government regulations
- Information protected by industry regulations
- Intellectual property
- Anything classified as confidential or private
6Why the focus on data privacy?
- Data breaches
- Legal consequences
- Loss of trust (customers, vendors, partners,
etc.) - Negative publicity
- Damage to reputation
- Government Regulations
- Federal Information Security Management Act of
2002 - Gramm-Leach-Bliley Act
- Personal Data Protection Directive (EU)
- HIPAA
- Data Protection Act (UK)
7U.S. Data Breaches
- There have been over 100 million individual data
breaches since ChoicePoint (Feb 2005) - Plague all verticals, but most common in
- Education University of Notre Dame (1/8/07)
- Govt Wisconsin Department of Revenue (12/29/06)
- Finance/banking Moneygram (1/12/07)
- Mostly malicious actions
- Hacking or stealing systems with information
8Privacy Regulations More Detail
9How much of your data is confidential?
SOURCE ESG Research Report Protecting
Confidential Data, March, 2006.
Confidential Data Stats
10Why is data privacy required?
- Production environment ? security model to
control access - Non-production environment ? security is opened
up to enable development and testing
- Non-production business drivers
- Development
- Testing
- Support
- Outsourcing
11Example Prod vs Non-Prod
12What is Data Masking?
- Protecting sensitive information by hiding or
altering data so that an original value is
unknowable. - Also known as
- De-identifying
- Protecting
- Camouflaging
- Data masking
- Data scrubbing
13Data Privacy Software Data Masking Best
Practices
14Best Practice 1 Enterprise Solution
- Single installation
- Connect to multiple databases
- Single Masking Engine
- Unified Architecture
- Reusable and repeatable policies
15Best Practice 2 Built in Masking Methods
- Substitute
- Randomize
- Shuffle
- Nullify
- Scramble
- Skew
- Encrypt
- Custom SQL
- Mathematical Formulae
16Example - Skew Method
- Taking an existing value and altering it within a
defined range
17Example - Substitute Method
18Best Practice 3 Easy to Use / Learn
- Navigation Tree modules and rule sets
- Designer Canvas Drag and drop auto discovery
- Rule Creator group rules logically
19Best Practice 4 - Content
- Substitute - Replace existing values with new
values that follow the format of the original - Male and Female Names
- Last names
- Male and female titles/suffixes
- Credit card numbers Visa, MasterCard, Amex
- Country, state, county, town names
- Zip codes
- Phone numbers
- Email addresses
20Best Practice 5 - Data Format Validation
- Ensuring that the structure of a piece of data is
maintained after masking
21Best Practice 6 - Data Consistency
22Additional Best Practices
- 7 - Relational integrity
- 8 - Policy simulation
- 9 - Auditability
23Best Practice 10 Application Awareness
What is sensitive?
Where is it?
How to mask it?
Whats it related to?
24Example Application Awareness
25Summary Data Masking Best Practices
- Enterprise solution
- Built-in Data Masking Methods
- Easy to use / learn
- Content
- Data Format Validation
- Data Consistency
- Relational Integrity
- Policy Simulation
- Auditability
- Application Awareness (Accelerators)
26Informia Secure and Oracle
- Applimation is an Oracle Certified Advantage
Partner, and has developed application specific
data masking accelerators for the Oracle
E-Business Suite. - The Informia Secure accelerators streamline the
data masking effort by providing functionality
focused data masking algorithms. The
application data has been analyzed to identify
likely data fields and potential masking
algorithms defined. The user can then choose the
specifics.
27Informia Secure and Oracle
- Accelerator Example
- Client wishes to mask the name field.
- Client selects Name for masking.
- Behind the scenes, Informia Secure knows the
related fields to also mask, such as First Name,
Last Name, etc. - Client chooses the method, e.g. Substitution.
- Informia Secure executes the data masking by
- selecting replacement values from a substitution
table - inserting the replacement values into the
primary table - creating new values for the related fields on
the table - cascading the new value set to other tables
using these fields
28Creating a Secure Oracle Instance
- Careful planning is needed to properly create a
secure Oracle E-Business Suite environment. The
following items should be defined upfront - Goals for data masking
- Uses of the secured environment
- Level of functionality to maintain.
- Level of data integrity to maintain
- Users of the secured environment and their access
levels.
29Creating a Secure Oracle Instance
- Goals for data masking
- Protect confidential personal information, such
as social security number, addresses, phone. - Protect confidential employment information, such
as salary, employee review data. - Uses of the secured environment
- Development Online Batch
- Testing Configuration, Online, Batch,
Production - Training Demonstrations
30Creating a Secure Oracle Instance
- Level of Functionality to maintain
- Which modules will be used in the secure
environment? - To what level does the functionality need to
function. - Level of data integrity to maintain
- Current Data
- Historical Data
- Intermodule relationships
- Users of the secured environment and their access
levels. - Types of user functional users, technical users.
- Access levels expanded user menu access, back
door (SQL) access.
31Creating a Secure Oracle Instance
- Using Applimation Informia Secure, you can easily
create a secure Oracle E-Business Suite
environment that protects your data, while
allowing you to productively use your secure
environment to meet your business needs.
32Questions