83
Information Obfuscation (Data Masking) Protecting Corporate Data-Assets Presented by Michael Jay Freer

Michael Jay Freer - Information Obfuscation

Embed Size (px)

DESCRIPTION

In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."

Citation preview

Page 1: Michael Jay Freer - Information Obfuscation

Information Obfuscation(Data Masking)

Protecting Corporate Data-Assets

Presented by Michael Jay Freer

Page 2: Michael Jay Freer - Information Obfuscation

Michael Jay Freer, SSGB, ITIL(v3), -Information Management professional providing

thought leadership to fortune 500 companies

including MetLife Bank, Tyco Safety Products,

Capital One, Brinks Home Security, and Zales.

Over his 25+ years experience he has worked with

business executives providing solutions in

Michael Jay Freer - Presenter Bio

business executives providing solutions in

financial management, manufacturing, supply

chain management, retail, marketing, and hospitality industries.

As an Enterprise Architect at MetLife Bank, Michael Jay specialized in

Information Obfuscation facilitating project solutions for protecting

business Confidential and Restricted data.

Slide# 2

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 3: Michael Jay Freer - Information Obfuscation

Information Obfuscation

(Data Masking)

Protecting Corporate Data-assets

Page 4: Michael Jay Freer - Information Obfuscation

Agenda

� Outlining the Problem

� Data Masking Golden Rule

� Defining Information Obfuscation

� Information Classification

Slide# 5

All rights reserved

� Information Classification

�Who is Responsible

� Defining a Common Language

� Data-Centric Development

[email protected]

(954) 249-1530 Michael Jay Freer

Page 5: Michael Jay Freer - Information Obfuscation

Outlining the Problem

Problem StatementCorporate Data breaches are occurring at an alarming rate.

1) It is incumbent on organizations to protect the customer,

partner, and employee data with which they are entrusted

2) Ease of access to sensitive information in business systems

3) Using unmasked Confidential and Restricted data in non-

production environments exposes risks to company reputationproduction environments exposes risks to company reputation

Business Rationale for Obfuscating Data• Reduce Data Breach Risks

• Heightened Legal and Regulatory scrutiny of data-protection

services (i.e.: SOX, HIPAA, GLBA, NPPI, FFIEC, PCI-DSS)

• Company Policies and Standards

• Fundamental assumption on the part of customers that their data

is already de-identified in non-production systemsSlide# 6

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 6: Michael Jay Freer - Information Obfuscation

Outlining the Problem

Problem StatementCorporate Data breaches are occurring at an alarming rate.

1) It is incumbent on organizations to protect the customer,

partner, and employee data with which they are entrusted

2) Ease of access to sensitive information in business systems

3) Using unmasked Confidential and Restricted data in non-

production environments exposes risks to company reputationproduction environments exposes risks to company reputation

Business Rationale for Obfuscating Data• Reduce Data Breach Risks

• Heightened Legal and Regulatory scrutiny of data-protection

services (i.e.: SOX, HIPAA, GLBA, NPPI, FFIEC, PCI-DSS)

• Company Policies and Standards

• Fundamental assumption on the part of customers that their data

is already de-identified in non-production systemsSlide# 8

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 7: Michael Jay Freer - Information Obfuscation

Data Masking Golden Rule

To put Information Obfuscation (Data Masking) into

perspective simply think about yourself:

How many vendors or service-providers have your

personal information (banks, mortgage holders

physicians, pharmacies, retailers, schools you applied

to, utilities, cellular carriers, internet providers, etc.)?to, utilities, cellular carriers, internet providers, etc.)?

Michael Jay’s Data Masking Golden Rule“Do unto your company’s corporate data-assets as you

would have your banker, healthcare provider, or favorite

retailer do unto your personal information.”

(Use this as your compass to navigate)

Slide# 10

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 8: Michael Jay Freer - Information Obfuscation

Defining Information Obfuscation

DefinitionInformation Obfuscation is the effort in both Business

Operations and non-production systems to protect business

Confidential and Restricted data from easy access or

visibility by unauthorized parties.

FrameworkFor our purposes, Information Obfuscation includes access

management, data masking, encryption of data-at-rest

(DAR) and encryption of data-in-transit including

principles for protecting business communications.

Slide# 11

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 9: Michael Jay Freer - Information Obfuscation

Information Classification

Sensitive Data “Sensitive” is a broad term for information considered to be

a business trade-secret; or considered private by regulatory

rule, legal act, or trade association (i.e.: GLBA, HIPAA,

FFIEC, PCI, PHI, PII).

Slide# 12

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 10: Michael Jay Freer - Information Obfuscation

Information Classification

Information Classification Levels �Public – non-sensitive data, disclosure will not violate

privacy rights

�Internal Use Only – generally available to employees and

approved non-employees. May require a non-disclosure

agreement.agreement.

�Confidential – intended for use only by specified employee

groups. Disclosure may compromise an organization,

customer, or employee.

�Restricted – very sensitive, intended for use only by named

individuals.

�Sealed – extremely sensitive, irreparable destruction of

confidence in and reputation of the organizationSlide# 18

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 11: Michael Jay Freer - Information Obfuscation

Information Classification

Information Classification Levels �Public – non-sensitive data, disclosure will not violate

privacy rights

�Internal Use Only – generally available to employees and

approved non-employees. May require a non-disclosure

agreement.agreement.

�Confidential – intended for use only by specified employee

groups. Disclosure may compromise an organization,

customer, or employee.

�Restricted – very sensitive, intended for use only by named

individuals.

�Sealed – extremely sensitive, irreparable destruction of

confidence in and reputation of the organizationSlide# 19

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 12: Michael Jay Freer - Information Obfuscation

Who is Responsible

You are!No matter your role in the organization, you are

responsible for protecting the “corporate data-assets.”

Everyone else is also responsibleAll of your peers are also responsible for protecting the All of your peers are also responsible for protecting the

Corporate Data-Assets.

However, you don’t have control over your peers, only

over your own vigilance and how you make your

management aware of any concerns, risk, or issues with the

security of the Corporate Data-Assets.

Slide# 22

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 13: Michael Jay Freer - Information Obfuscation

Defining a Common Language

CommunicationThe Business-Information Owner, Project Stakeholders,

Development Teams, and Support Teams need to use a

common language when discussing the various obfuscation

methods and where in the environment lifecycle an action

will occur.will occur.

Slide# 23

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 14: Michael Jay Freer - Information Obfuscation

Defining a Common Language

CommunicationThe Business-Information Owner, Project Stakeholders,

Development Teams, and Support Teams need to use a

common language when discussing the various obfuscation

methods and where in the environment lifecycle an action

will occur.will occur.

Slide# 24

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 15: Michael Jay Freer - Information Obfuscation

Defining a Common Language

What are we talking about?Information obfuscation includes any practice of concealing,

restricting, fabricating, encrypting, or otherwise obscuring

sensitive data.

This is usually thought of in the context of non-production This is usually thought of in the context of non-production

systems but it really encompasses the full information

management lifecycle from onboarding of data to

developing new functionality to archiving and purging

historical data.

Slide# 25

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 16: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Common Environments

1. Development – Code is created, modified and unit tested

2. Testing / QA – System, integration, & regression testing

3. User Acceptance (UAT) – Business-user validation

Test new business requirements and regression test Test new business requirements and regression test

existing functionality

4. Business Operations – Day-to-day business

environment

5. Business Support – Replicate and troubleshoot business

issues

Slide# 26

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 17: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Common Environments

1. Development – Code is created, modified and unit tested

2. Testing / QA – System, integration, & regression testing

3. User Acceptance (UAT) – Business-user validation

Test new business requirements and regression test Test new business requirements and regression test

existing functionality

4. Business Operations – Day-to-day business

environment

5. Business Support – Replicate and troubleshoot business

issues

Slide# 27

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 18: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Other Possible Environments

� Isolated Onboarding – When data from 3rd party

partners are transitioned in, there may requirements for a

secured environment to cleanse and prepare data for

integration into the business operations environments

� Isolated Data-Masking – Unmasked Confidential and

Restricted data should not be transferred to non-production

environments. A separate secure environment allows for

standardized data masking in-place

Slide# 29

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 19: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Other Possible Environments

� Isolated Onboarding – When data from 3rd party

partners are transitioned in, there may requirements for a

secured environment to cleanse and prepare data for

integration into the business operations environments

� Isolated Data-Masking – Unmasked Confidential and

Restricted data should not be transferred to non-production

environments. A separate secure environment allows for

standardized data masking in-place

Slide# 31

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 20: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Other Possible Environments

� Isolated Onboarding – When data from 3rd party

partners are transitioned in, there may requirements for a

secured environment to cleanse and prepare data for

integration into the business operations environments

� Isolated Data-Masking – Unmasked Confidential and

Restricted data should not be transferred to non-production

environments. A separate secure environment allows for

standardized data masking in-place

Slide# 32

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 21: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Other Possible Environments

� Isolated Onboarding – When data from 3rd party

partners are transitioned in, there may requirements for a

secured environment to cleanse and prepare data for

integration into the business operations environments

� Isolated Data-Masking – Unmasked Confidential and

Restricted Data should not be transferred to non-

production environments. A separate secure environment

allows for standardized data masking in-place

Slide# 33

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 22: Michael Jay Freer - Information Obfuscation

Common Language – Environment Lifecycle

Other Possible Environments

� Isolated Onboarding – When data from 3rd party

partners are transitioned in, there may requirements for a

secured environment to cleanse and prepare data for

integration into the business operations environments

� Isolated Data-Masking – Unmasked Confidential and

Restricted Data should not be transferred to non-

production environments. A separate secure environment

allows for standardized data masking in-place

Slide# 34

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 23: Michael Jay Freer - Information Obfuscation

Common Language – Masking Taxonomy

Methods of Obfuscating Information

� Pruning Data

� Concealing Data

� Fabricating Data

� Trimming Data � Trimming Data

� Encrypting Data

� Separating Data

Slide# 36

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 24: Michael Jay Freer - Information Obfuscation

Common Language – Where to Obfuscateopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

� Data Movement – Data can be removed, shorten, or encrypted

� Data Stores – Data can be encrypted, data-at-rest (DAR)

� Interactive User Interfaces – Only show required data or portions

of attributes for identification (i.e. account#, license#, SS#)

� Static Reporting – More restrictive than Interactive User Interfaces

Develo

Da

ta S

to

EncrypteEn

Slide# 37

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 25: Michael Jay Freer - Information Obfuscation

Common Language – Where to Obfuscateopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

� Data Movement – Data can be removed, shorten, or encrypted

� Data Stores – Data can be encrypted, data-at-rest (DAR)

� Interactive User Interfaces – Only show required data or portions

of attributes for identification (i.e. account#, license#, SS#)

� Static Reporting – More restrictive than Interactive User Interfaces

Develo

Da

ta S

to

EncrypteEn

Slide# 38

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 26: Michael Jay Freer - Information Obfuscation

Common Language – Where to Obfuscateopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

� Data Movement – Data can be removed, shorten, or encrypted

� Data Stores – Data can be encrypted, data-at-rest (DAR)

� Interactive User Interfaces – Only show required data or portions

of attributes for identification (i.e. account#, license#, SS#)

� Static Reporting – More restrictive than Interactive User Interfaces

Develo

Da

ta S

to

EncrypteEn

Slide# 39

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 27: Michael Jay Freer - Information Obfuscation

Common Language – Where to Obfuscateopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

� Data Movement – Data can be removed, shorten, or encrypted

� Data Stores – Data can be encrypted, data-at-rest (DAR)

� Interactive User Interfaces – Only show required data or portions

of attributes for identification (i.e. account#, license#, SS#)

� Static Reporting – More restrictive than Interactive User Interfaces

Develo

Da

ta S

to

EncrypteEn

Slide# 40

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 28: Michael Jay Freer - Information Obfuscation

Common Language – Where to Obfuscateopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

� Data Movement – Data can be removed, shorten, or encrypted

� Data Stores – Data can be encrypted, data-at-rest (DAR)

� Interactive User Interfaces – Only show required data or portions

of attributes for identification (i.e. account#, license#, SS#)

� Static Reporting – More restrictive than Interactive User Interfaces

Develo

Da

ta S

to

EncrypteEn

Slide# 41

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 29: Michael Jay Freer - Information Obfuscation

Common Language – Masking Taxonomy

Methods of Obfuscating Information

� Pruning Data

� Concealing Data

� Fabricating Data

� Trimming Data � Trimming Data

� Encrypting Data

� Separating Data

Slide# 42

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 30: Michael Jay Freer - Information Obfuscation

Common Language – Pruning Dataopment Environment

ora

ge

edncrypted

Data

Movem

ent

Encrypted

Pruning Data: Removes sensitive data from attributes in non-production environments. The attributes will still

appear on data entry screens and reporting but be left blank.

Develo

Data

Sto

EncrypteEn

Slide# 43

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 31: Michael Jay Freer - Information Obfuscation

Common Language – Pruning Dataopment Environment

ora

ge

edncrypted

Data

Movem

ent

Encrypted

Example

Pruning Data: Removes sensitive data from attributes in non-production environments. The attributes will still

appear on data entry screens and reporting but be left blank.

Develo

Data

Sto

EncrypteEn

Slide# 44

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Executive Salaries: Employee personnel records

can de-identify by changing Emp#, SS#, & names but

executive management records are easily tied back to

the organizational hierarchy (e.g., top 10 salaries).

Example

Page 32: Michael Jay Freer - Information Obfuscation

Common Language – Concealing Dataopment Environment

ora

ge

edncrypted

Data

Movem

ent

Encrypted

Concealing Data: Removes sensitive data from user access and visibility. For data entry screens and reports, the

attribute does not appear at all versus being Pruned (blank).Concealing data depends on clear rules for Access, Authentication, and

Accountability.

Develo

Data

Sto

EncrypteEn

Slide# 45

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 33: Michael Jay Freer - Information Obfuscation

Common Language – Concealing Dataopment Environment

ora

ge

edncrypted

Data

Movem

ent

Encrypted

Concealing Data: Removes sensitive data from user access and visibility. For data entry screens and reports, the

attribute does not appear at all versus being Pruned (blank).Concealing data depends on clear rules for Access, Authentication, and

Accountability.

Develo

Data

Sto

EncrypteEn

Slide# 46

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Bank / Loan Account#: Bank web sites generally

do not display account numbers even to the account

holder.

Example

Page 34: Michael Jay Freer - Information Obfuscation

Common Language – Fabricating Dataopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

Fabricating Data (synthetic data):1) Creating data to replace sensitive data

2) Creating data to facilitate full functional testing

3) Creating date for negative testing (error handling)

Develo

Da

ta S

to

EncrypteEn

Slide# 47

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 35: Michael Jay Freer - Information Obfuscation

Common Language – Fabricating Dataopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

Example

Fabricating Data:1) Creating data to replace sensitive data

2) Creating data to facilitate full functional testing

3) Creating date for negative testing (error handling)

Develo

Da

ta S

to

EncrypteEn

Slide# 48

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Contact >ame or ID#:Replacing contact name and ID# is the standard

method for de-identifying customer and employee

records.

Example

Page 36: Michael Jay Freer - Information Obfuscation

Common Language – Trimming Dataopment Environment

orag

e

edncrypted

Da

ta M

ov

emen

t

Encrypted

Trimming Data: Removes part of an attribute’s value versus Pruning which removes the entire attribute value.

Develo

Data

Sto

EncrypteEn

Slide# 49

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 37: Michael Jay Freer - Information Obfuscation

Common Language – Trimming Dataopment Environment

orag

e

edncrypted

Da

ta M

ov

emen

t

Encrypted

Example

Trimming Data: Removes part of an attribute’s value versus Pruning which removes the entire attribute value.

Develo

Data

Sto

EncrypteEn

Slide# 50

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Social Security# and Credit Card#:

Changing SSN# from 123-45-6789 to XXX-XX-6789

(or a new attribute = 6789) so that only part of the

information is available, usually for identification.

Example

Page 38: Michael Jay Freer - Information Obfuscation

Common Language – Encrypting Dataopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

Encrypting Data: Encryption can be done at the attribute, table, or database levels

(Encrypted data can be decrypted back to the original value)

Develo

Da

ta S

to

EncrypteEn

Slide# 51

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 39: Michael Jay Freer - Information Obfuscation

Common Language – Encrypting Dataopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

Encrypting Data: Encryption can be done at the attribute, table, or database levels

(Encrypted data can be decrypted back to the original value)

Develo

Da

ta S

to

EncrypteEn

Slide# 52

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 40: Michael Jay Freer - Information Obfuscation

Common Language – Encrypting Dataopment Environment

orag

e

edncrypted

Data

Mov

emen

t

Encrypted

Credit Card#: Credit card numbers are often encrypted for data transmission for FFIEC and PCI DSS compliance.

Example

Encrypting Data: Encryption can be done at the attribute, table, or database levels

(Encrypted data can be decrypted back to the original value)

Develo

Da

ta S

to

EncrypteEn

Slide# 53

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

for data transmission for FFIEC and PCI DSS compliance.

Encrypting credit card numbers at rest (DAR) provides

additional security.

Credit Card# is an example of an attribute that often falls into

multiple Obfuscation Methods.

Page 41: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating DataMo to

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Slide# 54

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 42: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating DataMo to

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Slide# 55

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 43: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating DataMo to

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Slide# 56

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 44: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating DataMo to

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Slide# 57

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 45: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating DataMo to

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Slide# 58

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 46: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 59

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 47: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 60

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 48: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 61

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 49: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 62

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 50: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 63

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 51: Michael Jay Freer - Information Obfuscation

ove Sensitive Data

o a Secured Table

Common Language – Separating Data

Data Separation: Moves sensitive data into multiple tables. Data can still be joined but Sensitive and Non-

sensitive attributes do not reside in a single record.

Mo to

Slide# 64

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 52: Michael Jay Freer - Information Obfuscation

Common Language – Masking Taxonomy

� Prune – Removes values from non-production systems. Attribute

appears on data entry screens and reporting but are blank.

� Conceal – Removes sensitive data from user access or visibility. For

data entry screens and reports, the attribute may not appear at all or be

obscured versus being Pruned (blank).

� Fabricate – Creating data to replace sensitive data and facilitate

proper application testing.proper application testing.

� Trim – Removes part of a data attribute’s value (Pruning removes the

entire attribute value)

� Encrypt – Unlike Fabricated Data, encrypted data can be decrypted

back to the original value.

� Data Separation – Moves specific segments of data or individual

datum into separate tables / databases to limit user access or visibility

Slide# 65

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 53: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, AccessIssue Supp

Quality Assurance

Development Staff

Slide# 67

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 54: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Environments

Users groups

Issue Supp

Quality Assurance

Development Staff

Slide# 68

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Environments

Obfuscation Method

Page 55: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Business End-users

Issue Supp

Quality Assurance

Development Staff

Slide# 69

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Business End

Page 56: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Business Support

Issue Supp

Quality Assurance

Development Staff

Slide# 70

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Business Support

Page 57: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

User Acceptance

(UAT)

Issue Supp

Quality Assurance

Development Staff

Slide# 71

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

User Acceptance

(UAT)

Page 58: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

QA / Testing

Issue Supp

Quality Assurance

Development Staff

Slide# 72

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

QA / Testing

Page 59: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Development

Issue Supp

Quality Assurance

Development Staff

Slide# 73

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Development

Page 60: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Business End-users

Issue Supp

Quality Assurance

Development Staff

Slide# 74

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 61: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Support Staff

Issue Supp

Quality Assurance

Development Staff

Slide# 75

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Support Staff

Page 62: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, AccessIssue Supp

Quality Assurance

Development Staff

Slide# 76

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

QA Testing Team

Page 63: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, AccessIssue Supp

Quality Assurance

Development Staff

Slide# 77

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Development Team

Page 64: Michael Jay Freer - Information Obfuscation

Business End-User Access

port Staff

Matrix – Method, Environment, Access

Developers in

developers in

Development Env

Issue Supp

Quality Assurance

Development Staff

Slide# 78

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Developers in

Non-development

Environments

Non-developers in

Development Env

Page 65: Michael Jay Freer - Information Obfuscation

Business End-User Access

ort Staff

Matrix – Method, Environment, Access

No Access to

Issue Suppo

Quality Assurance

Development Staff

Slide# 79

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

No Access to

environment or data

Page 66: Michael Jay Freer - Information Obfuscation

Business End-User Access

ort Staff

Matrix – Method, Environment, Access

Last Four Digits

Issue Suppo

Quality Assurance

Development Staff

Slide# 80

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 67: Michael Jay Freer - Information Obfuscation

Business End-User Access

ort Staff

Matrix – Method, Environment, Access

Fabricate Data

Issue Suppo

Quality Assurance

Development Staff

Slide# 81

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 68: Michael Jay Freer - Information Obfuscation

Business End-User Access

ort Staff

Matrix – Method, Environment, Access

Not Acknowledged

Issue Suppo

Quality Assurance

Development Staff

Slide# 82

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 69: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 84

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 70: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 86

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 71: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 87

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 72: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 88

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 73: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 89

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 74: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set

including the items above and is likely to be a combination of

fabricated and masked data

Slide# 90

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 75: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set,

including the items above, and is likely to be a combination

of fabricated and masked data (de-identified records)

Slide# 91

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 76: Michael Jay Freer - Information Obfuscation

Data-Centric Development

Projects that center around data analysis (i.e.: dashboards, BI,

data-marts / warehouses, etc.) often claim that they must have

“production data” to develop the solution.

It is true that the business will need production data for user

acceptance testing (UAT) but let’s consider a few other facts:

1) Negative testing will require fabricated data

2) New functionality will also likely require fabricated data

3) Existing production data may not contain all possible values

or permutations of data so full positive testing will also

require some level of fabricated data

4) Full regression testing will require a standardized test set,

including the items above, and is likely to be a combination

of fabricated and masked data (de-identified records)

Slide# 92

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 77: Michael Jay Freer - Information Obfuscation

Governance

Data stewardship is a key success factor for good data

governance and in this case for good Information

Obfuscation.

No one person will be aware of every government

regulation, trade association guideline, business functional

requirement, or company policy.requirement, or company policy.

Include representatives from data stewardship, security,

internal audit, and quality assurance teams in your solution

planning and project development teams.

Slide# 93

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 78: Michael Jay Freer - Information Obfuscation

Information Obfuscation Summary

1. Obfuscation occurs throughout the information lifecycle

not just in non-production environments

2. Everyone is responsible for protecting the corporate data

assets and the best data security tool is vigilance

3. Use a defined language to communicate who, what,

where, when, why, and how obfuscation will occurwhere, when, why, and how obfuscation will occur

4. Make Information Obfuscation part of your

organization’s business-as-usual (BAU) processes

5. Follow Michael Jay’s Data Masking Golden Rule

“Do unto your company’s corporate data-assets as you

would have your banker, healthcare provider, or retailer

do unto your personal information.”

Slide# 99

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 79: Michael Jay Freer - Information Obfuscation

Questions?

Slide# 100

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 80: Michael Jay Freer - Information Obfuscation

Thank You!

Slide# 101

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 81: Michael Jay Freer - Information Obfuscation

Appendix

Reference Material

Slide# 102

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 82: Michael Jay Freer - Information Obfuscation

Legal & Regulatory Alphabet Soup (Sampling)

� GLBA – The Gramm–Leach–Bliley Act allowed consolidation

of commercial & investment banks, securities, & insurance co.

� >PPI – Nonpublic Personal Information - Financial

consumer’s personally identifiable information (see GLBA)

� OCC – Office of the Controller of Currency regulates banks.

� PCI – Payment Card Industry; defines Data Security Standard � PCI – Payment Card Industry; defines Data Security Standard

(PCI DSS) processing, storage, or transmitting credit card info.

� PHI – Patient Health Information - Dept of Health & Human

Services (“HHS”) Privacy Rule (see HIPAA).

� PII – Personally Identifiable Information; used to uniquely

identify an individual. (Legal definitions vary by jurisdiction.)

Slide# 103

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer

Page 83: Michael Jay Freer - Information Obfuscation

Sample Cross Reference Chart

Data PointPII

PCI >PPI PHI

Customer - The Fact That an Individual is a Customer ** X

First, or Last Name *; Mother's Maiden Name X X

Country, State, Or City Of Residence * X X

Telephone# (Home, Cell, Fax) X X

Birthday, Birthplace, Age, Gender, or Race *

Social Security#, Account#, Driver's License#, National ID ++

X X

Passport#, Issuing Country

Credit Card Numbers, Expiration Date, Credit Card Security Code X XCredit Card Numbers, Expiration Date, Credit Card Security Code X X

Credit Card Purchase X

Grades, Salary, or Job Position *

Vehicle Identifiers, Serial Numbers, License Plate Numbers X

Email - Electronic Mail Addresses; IP Address, Web URLs X

Biometric Identifiers, Face, Fingerprints, or Handwriting

Dates - All Elements of Dates (Except Year +) X

Medical Record#, Genetic Information, Health Plan Beneficiary# X

* More likely used in combination with other personal data

** GLBA regulation to fall into the “Restricted” classification

+ All elements of dates (including year) if age 90 or older

++ Varies by Jurisdiction

Slide# 104

All rights reserved

[email protected]

(954) 249-1530 Michael Jay Freer