ELIMINATING COMPLIANCE RISKS - DATA MASKING WITH AZURE

Slides:



Advertisements
Similar presentations
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
Advertisements

Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Data Warehousing: Defined and Its Applications Pete Johnson April 2002.
Intro Informatica Productivity Pack Save Time and Money while Increasing the Quality of Your PowerCenter Deployment Louis Hausle.
MANIT WEB HOSTING SERVICES Presented by - Sandeep Jain & Devesh Lal CRISP, Bhopal.
Information Systems Security Computer System Life Cycle Security.
Database Change Management One solution to an often complex problem Kevin Hurwitz Headspring Systems
Database Security and Data Protection Suseel Pachalla, CISSP.
© 2005 Princeton Softech, Inc. Princeton Softech Anatomy of an Archive Project Let’s Talk About Data!! April 18, 2007 Alan Schneider.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Cloud Cellar Offers Users a Cost-Effective, Turnkey Backup and Restore Solution for Their Applications and Data Hosted in the Microsoft Azure Cloud MICROSOFT.
Enterprise Database Systems Introduction to SQL Server Dr. Georgia Garani Dr. Theodoros Mitakos Technological.
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Data Flow and SDLC HUSH via Firm Solutions, Inc. Virginia Mushkatblat copyright.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Veeam software Risk Mitigation and Protection
Maciej Pęciak Robert Dąbroś
Stephen W. Thomas Integration MVP
Stress Free Deployments with Octopus Deploy
Agile Metrics that Matter
Essentials of UrbanCode Deploy v6.1 QQ147
Continuous Delivery- Complete Guide
Launch Your Database Into Microsoft Azure
Managing the Project Lifecycle
Lead SQL BankofAmerica Blog: SQLHarry.com
Compliance with hardening standards
Firm Solutions, Inc. Virginia Mushkatblat copyright
Disaster Recovery and SQL for new and non-DBAs
Incrementally Moving to the Cloud Using Biml
Logo here Module 3 Microsoft Azure Web App. Logo here Module Overview Introduction to App Service Overview of Web Apps Hosting Web Applications in Azure.
Security Engineering.
BA Yearend Procedure.
Hush mail Customer Tech Support Number Hush mail Customer Tech Support Number Call Now : Toll Free Call Now : Toll Free.
6 Recommendations for Driving Business Value from Test Automation.
Myths About Web Application Security That You Need To Ignore.
Cloud Migration What to Consider When Switching Providers NAME: SYED TARIQ SHAH “WAQIF” REG NO: K1S18MCS0021 SUB: CLUSTER AND CLOUD COMPUTING.
DATA MASKING SOLUTIONS Microsoft and not so much
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Populating a Data Warehouse
Populating a Data Warehouse
Populating a Data Warehouse
Arrested by the CAP Handling Data in Distributed Systems
ELIMINATING COMPLINCE RISKS - DATA MASKING WITH AZURE
Today’s Business Pain Points
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Populating a Data Warehouse
Populating a Data Warehouse
Populating a Data Warehouse
Brandon Traffanstedt Systems Engineer - Southeast
Cloud Data Replication with SQL Data Sync
A 5-minute overview of ADAudit Plus
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Your code is not just…your code
ETL Automation using Biml
DATABASE SECURITY For CSCL (BIM).
Disaster Recovery is everyone’s job!
Power BI with Analysis Services
Data Mapping & Data Subject Rights
Anuj Dube Jimmy Lambert Michael McClendon
SSIS Data Integration Data Warehouse Acceleration
SSIS Data Integration Data Warehouse Acceleration
Protect data in core business applications
SSIS. FIRST EXPERIENCE. By Virginia Mushkatblat
SSIS Data Integration Data Warehouse Acceleration
SSDT, Docker, and (Azure) DevOps
Your code is not just…your code
Presentation transcript:

ELIMINATING COMPLIANCE RISKS - DATA MASKING WITH AZURE

SECURITY THREATS INTENTIONAL (FRAUD) UNINTENTIONAL Ponemon institute study of 60 large organizations Cost of cybercrime rose 26% to 11.6 Mil per company The most costly: Distributed Denial of Service (DDS) Web-based attacks Malicious Insiders SEI Study Of the 80 of internal fraud cases, 34 % involved Personally Identifiable Information UNINTENTIONAL Innocent insider is being set up by outsider with malicious code Insider negligence or accidental disclosure ( loss of laptop) The theft of an unencrypted laptop from an employee's car resulted in a breach affecting more than 61,000 patients in 2010 in Cincinnati Data courtesy of www.inforisktoday.com

IT RESPONDS BY TIGHTENING SECURITY Separation of environments Tightened controls Standards, policies, audits, drills, security framework Due to increased security processes, development slows down DEVELOPMENT LOOKS SOMEWHERE ELSE : CLOUD = EASY PROVISIONNING = SPEED TO MARKET SECURITY SPEED Development

IS CLOUD RISK FREE? Avoiding The Hidden Costs of The Cloud (Symantec) Of 3,236 companies : 40% exposed confidential info 25% suffered account takeover and digital theft 40% loss of data 23% fined for privacy violation IT RESTRICTIONS PRESSURE TO DEVELOP AT BREAKNECK SPEED PUBLIC CLOUD BECOMES DEVELOPMENT SANDBOX SECURTY BREACHES IN CLOUD –SLAs HOW DO WE PROTECT DATA?

DOES IT MEAN WE SHOULD AVOID CLOUD DEVELOPMENT? LETS TAKE A CLOSER LOOK AT DEVELOPMENT PROCESSES AND DATA FLOWS ACROSS ENVIRONMENTS

BIG PICTURE : DIFFERENT COMPANIES –DIFFERENT NEEDS STARTUP There is no data in organization. Development speed is high. Developers create their own data with “insert” statements. DEVELOPED ORGANIZATION Data in other systems and in production. It is used to populate development environments. Speed of development slows down. New Projects – add files and data feeds Continuous Development – adds its own production data Maintenance – no new features, no “inserts” any more Migration – only production data, moving on

NEW DEVELOPMENT When we start from Scratch, there is nothing and we can initially treat everything as if databases were code. Your Application Your Database Copyright 2005 / Scott W. Ambler

NEW DEVELOPMENT We create data with “INSERT” statements, saving them as code in Source Control. Cloud or no Cloud- makes no difference. Yes, promote to Staging Yes, promote to production CLEAR ALL THE TEST CASES LEAVE MASTER DATA Yes, promote to the QA SANDBOX: Create master data and test cases. test QA: Move new master data Run test cases Staging / UAT: Move New Master data, test for deployment Do UAT NO errors? NO errors? NO errors? Create a DDL and DML script in the source control Production Now, users are “testers” ERRORS ERRORS ERRORS

TO INFINITY AND BEYOND : IN PRODUCTION Big day being behind, we are in production Lots of transactions Database size reaches GB, TB, PT – think Amazon, we all want our business be there We scale in various ways, yet the CRUD logic is the same Master data matures and gets into DB via GUI WE BECOME THE “DEVELOPED ORGANIZATION” WITH EXISTING SYSTEMS AND CONTINUOUS DEVELOPMENT

THE USUAL WAY OF DOING DATA CYCLE DATABASE Master Data Transactional Yes, promote to Staging Yes, promote to production Yes, promote to the QA Back Up CLEAR ALL THE TEST CASES LEAVE MASTER DATA SANDBOX: Create master data and test cases. test QA: Move new master data Run test cases Staging/UAT:Move New Master data, test for deployment Do UAT NO errors? NO errors? NO errors? Create a DDL script in the source control Create DML Scripts - optional Production Now, users are “testers” ERRORS ERRORS ERRORS BACK UP Mask Sensitive Data BACK UP with Reduced data set Truncate Transactional Data Apply code

NEW DEVELOPMENT – EXISTING ORGANIZATION PRODUCTION SYSTEMS DIFFERENCE ETL MASK Yes, promote to Staging Yes, promote to production CLEAR ALL THE TEST CASES LEAVE MASTER DATA Yes, promote to the QA SANDBOX: Create master data and test cases. test QA: Move new master data Run test cases Staging / UAT: Move New Master data, test for deployment Do UAT NO errors? NO errors? NO errors? Create a DDL and DML script in the source control Production Now, users are “testers” ERRORS ERRORS ERRORS

WE NEED TO MASK BEFORE WE DEVELOP ! BUMMER! COMPLIANCE!!! SO WHAT IS THE CATCH? MASKING IS DEVELOPMENT ACTIVITY AND TAKES TIME THAT IS WHY IT IS OFTEN “FORGOTTEN” IN THE BEGINNING OF THE CYCLE, MAKING YOUR ORGANIZATION INSTANTLY NON-COMPLIANT CURRENT SOLUTIONS USUALLY WORK ON A GOLDEN DB COPY OF EXISTING SYSTEMS

SOLUTION :: YET ANOTHER WAY :: MASKING IN ETL PRODUCTION SYSTEMS ETL MASK Yes, promote to production Transactional Data Master Data Yes, promote to Staging Yes, promote to the QA QA: Move new master data Run test cases Staging/UAT:Move New Master data, test for deployment Do UAT SANDBOX: Create master data and test cases. test NO errors? NO errors? NO errors? DATABASE Create a DDL script in the source control Create DML Scripts - optional Production Now, users are “testers” ERRORS CLEAR ALL THE TEST CASES LEAVE MASTER DATA Get Delta ETL Package Move Staging Mask Sensitive Data Move To Sandbox Move To QA Apply a Transform To Accommodate DDL change

YET ANOTHER WAY : ETL SLA constraints on backup/load – you might not have privileges with your provider You need instant deltas of production data for development You have ETL already established You want masking be part of your already established ETL Requirements of GLBA, HIPAA, PSS/DSA Part of SDLC in Relational and in BI, with transforms Files Feeds from other production systems Benefits of HushHush No significant upfront investment No learning curve Part of development toolbox

ETL WITH AZURE AZURE FILES FTP ETL ETL MASK MASK VM VM DATABASE HADOOP

DATA FLOW WITH SSIS MASKING EXAMPLE

PERILS OF ENVIRONMENTS: DATA HOMOGNEITY ACROSS ENVIRONMENTS How close should environments be in terms of data? SANDBOXAND INTEGRATION ENVIRONMENTS hold the least amount of data. A rule of thumb: data set sufficient enough for developing functional requirements. Pros: speeds up development, cons: can’t accommodate all the test cases and needs constant data set assessments. The QA/Staging should hold complete data set to allow for UAT and for performance and regression testing. Break Fix environment holds data set and schema as close to production as possible to allow for speedy production issues resolutions. PHYSICAL CONSTRAINTS goes without saying. NO disk space means no disk space.

PERILS OF ENVIRONMENTS CONT.: ENVIRONMENT SLAs is development around the clock with international development team, 24/7 or only happens in one place with 8 hours development day/time? RATE OF REFRESHES depends on whether we do continuous deployments or scheduled releases DATA RETENTION how much and often transactional data gets purged? SCHEMA MANAGEMENT Schema/data in source control? Are deployments automated including data? Are there specific structures that support metadata?

DATA LOAD SOLUTION STRATEGIES ARCHITECTURAL PATTERNS Backup/Load ETL Solutions (different kinds) IN-CLOUD PATTERN - NEW VM Provisioning/IMAGE CONSTRAINTS Operational requirements for data availability data consistency performance data integrity Development Requirements for: development time skill sets Environmental Monetary (space and processors) Political (we just do not want to use third party)

QA/STAGING/BREAK FIX ENVIRONMENTS BE AWARE ! Backup/Load takes time. Count on it. Refactoring takes time. Count on it. ETL takes time. Count on it. Masking has its own architectures. Chose the one appropriate.

USED TOOLS AND OTHER TOOLS THAT HELP I used: SQL Server, SSMS, SSIS, HushHush components, Data Quality Services, TFS, VS, Visio If you do not have VS and TFS: Red Gate: SQL Compare, SQL Data Compare,SQL Data Generator, SQL Source Control Embarcadero: E/R Studio, DB Change Manager HUSH-HUSH Masking components for ETL architectures from FSI

CONTACT US info@mask-me.net 855.YOU.HUSH www.mask-me.net