Database Security Assignment
Database Security Assignment
Assignment
Data And Database Security (DDS)
Prepared by:
Rusiru Karunarathna | EMSc|IS|75|494
Submitted t0o:
Mr. Gayan Lokumanna
Due Date:
5th June 2022
1
According to Gartner, using data masking tools can “minimize the footprint and propagation
of sensitive data (or its viewing) without extensive custom development.”
This document presents the IBM® InfoSphere® Optim Data Privacy used data masking
tools for small, mid-sized, and large organizations. These tools have been featured on popular
review portals such as Gartner and G2.
According to a 2016 study by the Ponemon Institute, upwards of 25 percent of all data
breaches involve employee or contractor negligence. Whether through maliciousness or
carelessness, the legitimate data access privileges of employees contribute to many data
breach and leak incidents.
This threat can be minimized by allowing each employee to see only the data they require to
complete their work with the remaining data masked.
Plenty of organizations require data in order to build and test new programs or functions, as
well as to test necessary patches and upgrades. It would be impossible to tell if a program is
going to perform as it needs to if it can’t be tested with data. However, if it were tested with
the actual data of users, customers, or employees, it would open up that data to the eyes of all
kinds of employees or contractors who don’t require access to it.
2
It would also allow that data to be stored in potentially insecure development environments
that may be vulnerable to hackers.
IBM® InfoSphere® Optim Data Privacy provides extensive capabilities to effectively mask
sensitive data across nonproduction environments, such as development, testing, QA or
training.
Testing sandbox
Substitute test environments with realistic, fictionalized data, creating a safe
environment for testing that accurately reflects business processes.
IBM® InfoSphere® Optim Data Privacy helps mask and govern sensitive information (PII
and other confidential data) for non-production environments such as development, testing,
or QA.
The solution can mask data in real-time to prevent or mitigate the damage of a cyber attack. It
can also mask on-screen data to guarantee that only the right people can access sensitive
information. You can also use Optim Data Privacy to obfuscate the data used in ETL
workflows and other data pipelines.
Part-2 Encryption
While network and Internet security have been addressed through rigorous authentication
and encryption to restrict access to sensitive personal, financial, and medical information,
data at rest remains vulnerable. Restricting access to data backups has been accomplished
primarily by restricting access to the backup media. Yet a single backup tape might contain
millions of credit card transactions, thousands of medical records, and multiple copies of a
company’s public and not-so-public financial data. A single backup tape can also fall off a
truck, be mislaid in a warehouse, fit in a jacket pocket of a disgruntled worker, or be
retrieved by dumpster divers after a tape has been discarded. Compliance with privacy
regulations and explicit legal liability for accidentally exposed information are forcing many
organizations to revisit their protection procedures for backup data and media. Several high
profile examples have underscored the difficulty of the fortress approach. Companies with
the most data tend to be the companies with the most sensitive data. It’s unreasonable to
expect that many thousands of backup tapes can be transported, stored, and discarded
without a few that end up exposed to misfeasance or malfeasance. A better solution is to
encrypt the backup data, in the same way data is encrypted in network transfers. Like
encrypted network data, this gives authorized users easy access while making it nearly
impossible for unauthorized users to access data. Encrypting data prior to storage can be
accomplished in several ways, but most have substantive disadvantages in cost,
performance, scalability, or management. Spectra Logic Corporation’s Blue Scale
Encryption integrates hardware encryption directly into the electronics of a tape library,
offering a practical, affordable, and scalable option. Blue Scale exploits elements in the
modular architecture of Spectra® libraries to provide an easy-to-manage encryption solution.
5
One of the complaints about IRM solutions is that they require the user to have specialized
IRM software installed on their computer in order open any file with IRM protections
applies. For this reason, many enterprises seek to limit IRM protection only to files that
require protection based on their content.
Despite the fact that IRM can solve a lot of the security issues that arise when documents are
shared, there are still simple workarounds that can negate the benefits of IRM. A simple hand
held camera (or a smartphone) can capture an image of a file with IRM protection. Most
Apple computers can also negate IRM benefits with a simple click of Command-Shift-4
combo that enables screen capture. Likewise for 3rd party software that provide screen
capture capabilities.
How Office 365 supports Information Rights Management
Microsoft AD Rights Management is a popular IRM solution for data in on-premises email
and file servers and Office 365 is now the most popular enterprise cloud service. Office 365
has IRM capabilities across several of its product offerings, powered by Microsoft Azure.
Unlike Active Directory Rights Management that has been used for years as an on-premises
6
solution for data security, Microsoft Azure Rights Management is Microsoft’s IRM solution
for the cloud.
Organizations that have synced their Active Directory to Azure Rights Management server
can also transfer their IRM policy templates from Office 365 to their users’ desktop versions
of Microsoft Office apps. At a high level, there are three methods to apply IRM protection a
document in Office 365.
Office 365 administrators can activate certain rights management features that enable
SharePoint site owners to create IRM rules and apply them to different libraries or lists. Users
who upload files to that library can then be assured that the document will remain protected
according to the IRM rules.
Organizations who want more granular control can configure Microsoft Azure with
Advanced Rights Management Services. This feature allows administrators to create policy
templates for individual users and groups of users. One of the advantages of activating this
feature is that the policies can then be pushed to the user’s or group’s desktop Office
applications.
The first two approaches are based on sites, users, and groups and can apply IRM protection
to files that do not require it. A cloud access security broker (CASB) can integrate with
Office 365 and IRM offerings to broker the application IRM protections to files based on
content or context. For example, a CASB can apply IRM protections to files with sensitive
data downloaded to unmanaged devices from Office 365.
Administrators and site owners can limit activity by applying settings to make documents
read-only, disable copying of text and restrict the ability to save local copies, or disallow
printing of the file. Supported file formats include PDFs, MS Word, PowerPoint, Excel,
XML formats for each as well as XPS formats.
References
Balaganski, A. (2016, Jan 12). Information Rights Management explained. Retrieved from
kuppingercole: https://www.kuppingercole.com/blog/balaganski/information-rights-
management-explained
IBM InfoSphere Optim Data Privacy. (2021, January). Retrieved from https://www.ibm.com/:
https://www.ibm.com/products/infosphere-optim-data-privacy
7
Marking Scheme
Referencing 10%
Comments
----------------------------------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------