protect your database with data masking & enforced version control

49
Protect your Database With Data Masking & Enforced Change Processes Joseph Santangelo & Yaniv Yehuda

Upload: dbmaestro

Post on 12-Jul-2015

232 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Protect your Database with Data Masking & Enforced Version Control

Protect your Database With Data Masking

& Enforced Change Processes

Joseph Santangelo & Yaniv Yehuda

Page 2: Protect your Database with Data Masking & Enforced Version Control

2

• You will be on mute for the duration of the event

• We are now talking so please type a message in the Questions box in the Control Panel if you can’t hear us (please check your speakers and GoToWebinar audio settings first)

• If you have questions during the session, please submit them on the Q&A bar on your gotowebinar dashboard and we will address them at the end

• A recording of the full webinar will be put up online

Before We Begin

Page 3: Protect your Database with Data Masking & Enforced Version Control

3

Presenters

Joseph Santangelo

• SVP Sr. Security Consultant at DMsuite

Page 4: Protect your Database with Data Masking & Enforced Version Control

4

Presenters

Yaniv Yehuda

• CTO, Co-Founder at DBmaestro

Page 5: Protect your Database with Data Masking & Enforced Version Control

About DMsuiteR

• Axis Technology Founded in 2000

• DMsuite launched in 2005

• Headquarters in Boston

Page 6: Protect your Database with Data Masking & Enforced Version Control

About DBmaestro

• Founded in 2008, product launched in 2010

• Founded by Yariv Tabac and Yaniv Yehuda

• Headquartered in Israel, Global Operations

Page 7: Protect your Database with Data Masking & Enforced Version Control

7

Protect your Database

With Data Masking

& Enforced Change Processes

Page 8: Protect your Database with Data Masking & Enforced Version Control

8

Your database holds your company's most

sensitive and important assets - your data!

Customer personal details, credit card numbers, social

security numbers- you can't afford leaving them vulnerable

to any- outside or inside- breaches.

Page 9: Protect your Database with Data Masking & Enforced Version Control

9

• Many Types

• Client / Patient / Credit Card

• Employee

• Intellectual Property

• At Risk

• Where is it?

• How many copies are targets?

• Are changes controlled?

Sensitive Data is a Major Asset

Page 10: Protect your Database with Data Masking & Enforced Version Control

Internal and External Vulnerabilities

Non-Standard

SSL Traffic

10

Drive By Attacks

Watering

Hole Attacks

Bot Nets

Social Engineering

Attacks

Spear Phishing

Page 11: Protect your Database with Data Masking & Enforced Version Control

11

Where’s my Data ???

How does the data

flow when it is received

into the environment

Page 12: Protect your Database with Data Masking & Enforced Version Control

12

• Dealing with Challenges from the inside…

• Controlling change process

• Knowing Who was making changes

• Audit & compliance

• Who should be allowed to make changes?

• Controlling roles & responsibilities

• => Deploying changes

Due Process

Page 13: Protect your Database with Data Masking & Enforced Version Control

13

• The database holds your essential information

• Any changes can impact the entire system

• Need to be synchronized with other changes

• Often overlooked

Database is a Key Component

Page 14: Protect your Database with Data Masking & Enforced Version Control

14

• Silos exist…

• Don’t always communicate effectively

• Need to share knowledge

• Need to follow same procedures & best

practices

Developers and DBAs

Page 15: Protect your Database with Data Masking & Enforced Version Control

15

Attacks are on the Rise !

Page 16: Protect your Database with Data Masking & Enforced Version Control

Breaches Happen

In the event of a breach, full cost to an organization

can include one or more of the following:Notifying customers / patients,

Investigating and controlling the breach,

Potential litigation and fines,

Intangible costs associated with:

Damage to your brand,

Loss of customers,

Decline in value, and

Reputation Management

FULL

COST

of a

Breach

16

Page 17: Protect your Database with Data Masking & Enforced Version Control

Sensitive Data Concerns

Industry regulations such as HIPAA, PCI DSS, PIPEDA, DDP, GLBA, Safe Harbor and corporate data governance standards that require the protection of sensitive data such as social security numbers, personal, financial, and healthcare information.

Many of these concerns become even more challenging to address when testing is outsourced to a third party.

Page 18: Protect your Database with Data Masking & Enforced Version Control

Some Options…

Organizations have many, many copies of data in different data stores around their organization.

Each of these locations is a potential target from external sources and needs to be protected.

The Verizon Data Breach Study recommends that organizations eliminate unnecessary data.

Once you understand where your data is you can determine if: It is needed and controls are in place around it

It is needed at all and can be deleted

It is needed for test purposes, analytics or sharing and should be masked

18

18

Page 19: Protect your Database with Data Masking & Enforced Version Control

What is Data Masking?

Data masking is also known as data obfuscation,

data privacy, data redaction, data sanitization, data

scrambling, data deidentification, data anonymization

and data deauthentication.

Potential abusers, can be employees or employees

of outsourcing firms, such as users of test databases

(programmers, testers and database administrators)

or users of analytical and training databases

(analysts, researchers and trainees).

Masked data should be realistic and quasi-real so

that it can ensure that the application running against

masked data performs as if the masked data is real.

Page 20: Protect your Database with Data Masking & Enforced Version Control

Data Masking and the Cloud

Replace sensitive data with fictitious but realistic data to facilitate

testing of analysis while eliminating the risk of exposure to

unauthorized parties in a multi-tenant environment.

Page 21: Protect your Database with Data Masking & Enforced Version Control

Data Masking and Big Data

Mask Data in three scenarios:

1. While being fed into Big Data Repository

2. In the Big Data Repository using Map-Reduce techniques

3. As it is being fed from Big Data Repository

Data In Data Out

1 2 3

Page 22: Protect your Database with Data Masking & Enforced Version Control

How Does DMsuite Mask Data?

Data Masking* — Replace sensitive data with fictitious but realistic data to eliminate the risk of exposure to unauthorized parties.

The Axis DMsuite solution is completely automated and designed to be rapidly implemented and institutionalized. Our unique approach is to break the association

between unique identifiers and personally identifiable data.

* Data Masking = redaction, de-identification, depersonalization, anonymization, obfuscation

Page 23: Protect your Database with Data Masking & Enforced Version Control

Masked / De-Identified / Anonymized

Field Production Value Masked Value

First Name Christopher Romanth

Address 123 Stone Street 62 Main Street

Phone 703-891-2426 703-555-1287

Date of Birth 07/11/82 07/24/82

SSN 621-02-4579 805-23-1290

DMsuite masked values are realistic but fictitious.

DMsuite does not store or make copies of production

data.

You cannot use DMsuite to view any production data.

Page 24: Protect your Database with Data Masking & Enforced Version Control

DMsuite Masks

Applications

• Oracle E-Business

• Salesforce

• PeopleSoft

• Trizetto

• SAP

• MS CRM

• Lawson

• AMISYS

Databases

•Oracle

•MSSQL Server

• Informix

•DB2

•Teradata

•MS Access

•MySQL

•Netezza

•Cache

•Sybase

• Ingres

•Vertica

•Greenplum

•PostgreSQL

Files

• XML

• CVS

• Multi-record

• Word

• Excel

• PPT

• RSS

• Un-structured

• EDI

Mainframe

• DB2

• IMS

• ADABAS

• QSAM

• VSAM

Big Data

• Cloudera

• Hortonworks

• Hadoop

NoSQL

• MongoDB

• Cassandra

…and keeps referential integrity across all of them

Page 25: Protect your Database with Data Masking & Enforced Version Control

What to Look for

Easy to Use

Ability to find Sensitive Data on databases

Automate Masking process

Referential Integrity Across Platforms

Map-Reduce capabilities

Role based access

Irreversible algorithms

No visibility to production data

Tokenization

No production data is persists outside of production environment

No staging environment is required to mask the data

Page 26: Protect your Database with Data Masking & Enforced Version Control

DMsuite: Masked Data

Secure Your Data Easy To Use Any Data

• Instead of Prod data

• Realistic but fictitious

• Patented Algorithms

• Irreversible

• Regulatory compliance

(HIPAA, PCI DSS)

• Locate sensitive data

• Mask without programming

• Mask data in any language

• Nothing to install on your DBs

• Any OS, Virtual or Physical

• Interface: Web Services & CLI

• Private, Public or Hybrid Cloud

• In-Place or On-The-Fly

• Or create DBs then mask data

• ERP (SAP, PeopleSoft, EBS, etc

• MSSQL, Oracle, etc.

• ASCII Files

• EBCDIC Files

• MS Office Files

• XML, EDI, X12

• Unstructured Data

• Big Data (Hadoop etc.)

• No SQL (MongoDB etc.)

Page 27: Protect your Database with Data Masking & Enforced Version Control

AUTOMATE PRIVACY

DATA MASKING / DE-IDENTIFICATION

Page 28: Protect your Database with Data Masking & Enforced Version Control

28

• Old adage but true

• The database is often neglected and therefore can

become the weakest link

• Essential from a compliance and business point of

view

• Ensure that changes are not made without

authorization

• Ensure no out-of-process changes

• Should be the strongest link

The Weakest Link In DevOps Chain

Page 29: Protect your Database with Data Masking & Enforced Version Control

29

Lets talk about Challenges…

“it was difficult to track who made a change to a database object and

what change they made.” (working-around file based version control)

“it took hours to get releases working. some changes were not

documented and left out…” (manual and error prone releases)

“We had multiple releases to production every day. That is one release

a week with multiple follow up fixes, and yet more fixes”(code overrides, partial versions, wrong versions – all pushed to production)

“We recently had a disaster - the script in the version control was not

updated and when executed in production, ran the wrong revision. That

cost tens of thousands of $”(an out-of-process update to QA that was not properly tracked)

Page 30: Protect your Database with Data Masking & Enforced Version Control

30

• Root Causes for issues:

• Manual script based version control process

• Lack of control – who was making changes

• Deployment tools making assumptions

• No release automation red-flags…

Page 31: Protect your Database with Data Masking & Enforced Version Control

31

• Challenges from the inside

• Controlling change process

• Who was making changes?

• Audit & compliance

• Who should be allowed to make changes?

• Controlling roles & responsibilities

• => Deploying changes

The need to follow Due Process

Page 32: Protect your Database with Data Masking & Enforced Version Control

32

Tracking change process

Version Control Process

(file based)

Development Process

Check-Out Script

Modify Script

Get updated Script from DB

Check-In Script

Compile Scriptin DB

Debug Scriptin DB

?

??

?

A

A’

Page 33: Protect your Database with Data Masking & Enforced Version Control

33

Scripts & Version Control

Challenges…

• Code-overrides

• Working on the wrong revisions

• Scripts do not always find their way to the version control solution

• Out of process updates go unnoticed

• Hard to locate outdated update scripts

Playing safe? what we really need:

• The actual code of the object

• The upgrade script

• A roll-back script

Scripts

• Hard to test in their entirely (holistically)

• Hard to test due to colliding dependencies

• Need to run in a specific order…

• Much harder to deal with project scope changes

Page 34: Protect your Database with Data Masking & Enforced Version Control

34

Enforced Change Process

Page 35: Protect your Database with Data Masking & Enforced Version Control

35

Due process benefits…

Integrated Database Version Control process

• Leverage proven version control best practices

• Forcing check in & out for changes

• Labels

• etc..

• No code-overrides

• Always working with the correct revision

• All changes are documented

• No out-of-process changes

• Correlate each database change with a change request

• Always know who did what, when, why and from where

• Supporting structure, code and content

No time spent on manual coding of the change scripts

Page 36: Protect your Database with Data Masking & Enforced Version Control

36

Detailed log

Page 37: Protect your Database with Data Masking & Enforced Version Control

37

Audit & compliance

Who?

What? When? why?

Page 38: Protect your Database with Data Masking & Enforced Version Control

38

Controlling Roles & Responsibilities

Page 39: Protect your Database with Data Masking & Enforced Version Control

39

We need to leverage version control

into deployment decisions…

Page 40: Protect your Database with Data Masking & Enforced Version Control

40

1.11.21.31.41.51.61.7

Build & Deploy On Demand

*

Int QA Stage Prod

Database Deploy Script

Environment* Execute the same script being executed at the Stage environment

Re-Base (due to defects)

Dev

Dev

Dev

Model

1.1 1.2

1.2 1.3

1.3 1.4

1.4 1.5

1.5 1.6

1.6 1.7

1.1 1.4

1.4 1.7

1.1.1 1.7

1.1 1.1 1.11.41.7

File Based Version Control

Out of Process Change

1.1.11.7 1.1.11.7

Page 41: Protect your Database with Data Masking & Enforced Version Control

41

Simple Compare & Sync

Safe to automate?

No. Requires manual inspection…

Page 42: Protect your Database with Data Masking & Enforced Version Control

Safety Net For Deployment Automation

Source vs. Target

Action

= No Action

≠ ?

Source vs. Baseline

Target vs. Baseline

Action

= = No Action

≠ = Deploy Changes

= ≠ Protect Target

≠ ≠ Merge Changes

You do not have all of the information

With Baselines and 3 way analysis the unknown is now known

Simple Compare & Sync Baseline aware Analysis

Page 43: Protect your Database with Data Masking & Enforced Version Control

43

Deploying Changes if Needed

Development Baseline

Previous Label /

Production Golden Copy

Production

If we had the index in the baseline =>

we should take it down from production…

(Deploy Change)

Page 44: Protect your Database with Data Masking & Enforced Version Control

44

Or Protecting Target Environment…

Development Baseline

Previous Label /

Production Golden Copy

Production

BUT… If no index in baseline =>

we should protect the NEW index on production!!!

(Protect Target)

Page 45: Protect your Database with Data Masking & Enforced Version Control

45

Conflict Resolving – Database Code

Page 46: Protect your Database with Data Masking & Enforced Version Control

46

Impact Analysis not damage control...

Page 47: Protect your Database with Data Masking & Enforced Version Control

47

Safety Net For Deployment Automation

Database Safe Deployment Automation:

• Leverages version control (baselines & previous revisions)

• Has a flexible scope (deploy multi schema to single task or work item)

• Can be run as a batch process (repeatable & consistent)

• Integrates to ALM (labels, CRs, Continuous Integration & Delivery)

• Deals with conflicts & merges to match code agility

Can raise red flags to stop the line…

if requires human intervention

Page 48: Protect your Database with Data Masking & Enforced Version Control

Summary - What is DBmaestro TeamWork?

• Database Enforced Change Management solution+ Database version control

+ Enforce best practices

+ Plugs into the ALM (change request, tickets & work items)

+ Database merge & change impact analysis

+ Know who can do what, where, when & why

• DevOps Solution for databases + Baseline aware deployment automation, rollback &

recovery

+ Reduce database deployment issues

+ Plugs into release management & Continuous Delivery

Page 49: Protect your Database with Data Masking & Enforced Version Control

49

Q & A