0% found this document useful (0 votes)
13 views8 pages

WhitePaper DataMasking

This white paper discusses the importance of protecting sensitive data through data masking to prevent data breaches that can harm an organization's reputation and finances. It outlines best practices for managing sensitive data, including identifying data owners, limiting access, and implementing data masking policies. Fujitsu's Data Masking feature in its Enterprise Postgres database helps organizations secure sensitive data by obfuscating it while maintaining usability.

Uploaded by

ppar512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views8 pages

WhitePaper DataMasking

This white paper discusses the importance of protecting sensitive data through data masking to prevent data breaches that can harm an organization's reputation and finances. It outlines best practices for managing sensitive data, including identifying data owners, limiting access, and implementing data masking policies. Fujitsu's Data Masking feature in its Enterprise Postgres database helps organizations secure sensitive data by obfuscating it while maintaining usability.

Uploaded by

ppar512
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Best practices for

sensitive data
using Data Masking

White paper

Page 1 of 8 www.fast.fujitsu.com/
White paper - Best practices for sensitive data - using Data Masking

Best practices for sensitive data


using Data Masking
Data breaches damage a company's reputation, destroy customer confidence,
and have major financial implications.

Many organizations unwittingly reveal sensitive data when they provide


unrestricted access to data to their own staff or staff of third parties, or copy
sensitive or regulated data into nonproduction environments, making data in
those environments a target for cybercriminals.

To maintain customers' trust, organizations must take responsibility and put


more focus on the management of sensitive data.

This white paper discusses the root causes contributing to organizational


noncompliance with regulations governing data management, and explains
how to implement best practices for sensitive data.
White paper - Best practices for sensitive data - using Data Masking

Executive summary The problem


Are you aware that sensitive data may be at risk in your Lack of responsibility of organizations
organization?
As a result of the perceived convenience to the consumer,
• Your staff may have unrestricted access to sensitive data many organizations are now accumulating vast amounts of
• Sensitive data is made available to third parties with personally identifiable information. This information is at risk
which you have a commercial arrangement of attack if sufficient security measures are not implemented
and maintained. Furthermore, unrestricted access by the
• Production data has been copied to development and
staff of these organizations, as well as third parties with
test environments, and that data may be accessible by
which they may have a commercial relationship,
cybercriminals, and can be lost or stolen
considerably exacerbates the potential for harm.
Data breaches not only damage your organization’s
Consider for a moment, two of the most popular trends
reputation and brand. They also have legal and financial
today, one a business trend, the other a technology trend,
implications.
and their impact on the securing of sensitive data.
Fujitsu has identified a need to help organizations better
protect their customers' sensitive data. In response, it has Outsourcing
added a Data Masking feature to its flagship enterprise Three of the most commonly outsourced services,
database management system, Fujitsu Enterprise Postgres. "Customer Support", "Accounting", and "Tax Preparation", all
Read on as we discuss issues relating to sensitive data involve making personal information available to third
management, from the causes of data breaches, to parties. What is an adequate level of protection for this
implementing best practices for managing sensitive data in data? Nondisclosure agreements certainly don't cut it, even
your organization. Learn about Fujitsu's implementation of if those countries' laws enforced significant penalties for
Data Masking, and how it can help mitigate data breaches. breaches.

Introduction Application security frameworks

Hackers have stolen headlines across the world with highly On the technology side, many organizations now manage
publicized information security breaches over the last few access (authorization) to data at the application layer, using
years. Some of these, such as the hacking of the Australian various security frameworks that come embedded within
Bureau of Meteorology, increase the public's awareness and their chosen application development framework. These
general acceptance of data vulnerability in today's society. often see a single generalized database role with an
elevated degree of privileges being used by all requests
While average consumers are mindful of public
from one or more applications. In some instances, the
recommendations on how to protect their personal data, the
superuser role is even used.
convenience of online shopping, bill paying and the draw of
social media is overpowering. This often leads to increasingly Organizations must take responsibility and put more focus
placed trust in those organizations to which they supply on the management of sensitive data.
personal information. Most organizations store data in one type of database or
another, as this is the most efficient way of finding
information when it comes to using it. So this is where
security of data must begin.

Challenges in protecting data


While just modifying sensitive data sounds very straightforward, there are
a number of challenges that include identification and use of sensitive
data, auditing change, maintaining data integrity, managing volume, and
Page 3 of 8 fast.fujitsu.com
maintaining flexibility of data usage.
White paper - Best practices for sensitive data - using Data Masking

Regulatory noncompliance The solution


The Global Financial Crises of 2007-2008 saw the emanation Sensitive data best practices
of regulatory bodies across many industries introducing new
Most responsible organizations implement a set of best
and stricter regulations governing data management.
practices which are generally accepted as being the right
Unsurprisingly, fewer industries fought with more vigor than
way of doing things for a particular industry or
the financial services sector, which is now one of the most
business/technology area. Database administrators usually
highly regulated sectors today.
follow a set of DBA best practices, of which comprehensive
According to Steven Norton, The Wall Street Journal, of all versions include a subset of practices for managing sensitive
the data breaches investigated by Verizon over the last 10 data.
years, not a single company that handled payment card data
Best practices for the securing of sensitive data include:
was found to be compliant with all 12 Payment Card Industry
(PCI) requirements at the time the investigated breach of • Identifying the data owner
sensitive data occurred. Compliance has since increased in • Determining the importance of keeping the data
every area except that of testing. Verizon recommends that
• Knowing where the data is kept and who has access to it
organizations should limit the number of places where
sensitive data is at risk by implementing procedures such as • Classification of data and the impact of it being stolen or
data masking. [1] lost

Similar recommendations can be found in the results of • Removal of data when no longer required
compliance audits of many of today's data compliance • Only allowing access to data if needed
regulations. Fujitsu Enterprise Postgres already implements strong
Causes of noncompliance measures for protecting sensitive data. In addition to correct
placement (that is, behind an appropriately configured
Some root causes contributing to such a high degree of
firewall), it also provides:
organizational noncompliance with regulations include:

• Sharing of customer data with business partners or • Configuration of which servers to allow connections from
market research organizations • Host based authentication
• Duplication of production data into development and test • Encryption of underlying data with Transparent Data
environments Encryption

• Addition of applications to existing production data • Row-Level Security to restrict access to row data
where security was moved from the data source layer into With the new Data Masking feature in Fujitsu Enterprise
the application layer Postgres, sensitive data is only made available to people
Publication of noncompliance has resulted in protection of who need it, and even then, that data can be partially
sensitive data in nonproduction environments coming to the obfuscated.
forefront of IT tasks in current years.
In order for organizations to meet these challenges and fulfil
their compliance obligations, best practices for sensitive
data are gaining significance and seeing a greater rate of
adoption.

Data Masking policies


Data masking minimizes security risk by enabling user-based confidentiality, altering
original data while maintaining its usability. Fujitsu Enterprise Postgres implements
data masking using a powerful yet user-friendly policy approach that allows
Page 4 of 8 fast.fujitsu.com
flexibility in the redaction of different types of data to different types of roles.
White paper - Best practices for sensitive data - using Data Masking

Data Masking Fujitsu's Data Masking Implementation


Data masking provides the ability to obfuscate specific The Data Masking feature in Fujitsu Enterprise Postgres has
columns or parts of a column while still maintaining the been implemented using a flexible and easy-to-use policy
usability of the data. approach. This allows a set of sensitive data policies to be
There are many scenarios where data masking is of benefit developed for different classifications of data and different
to organizations. One of the more common use-cases is classifications of people without getting too entrenched in
partial obfuscation of information such as credit card the complexities of the technology. A policy can then be
numbers to staff in outsourced customer service centers, applied to tables for the different columns that fall under
allowing staff to validate the card number with the customer one classification or another.
without allowing access to the full personal information. Once policies have been applied to tables, they can be
disabled or enabled as required without having to remove or
reapply them.
A number of tables are available for querying data masking
policy information to assess the current sensitive data policy
state of a database.
Three different types of data masking are available:

• Full Masking - A whole column value can be obfuscated


with alternate values
• Partial Masking - Part of a column value can be
Figure 1 - Online masking obfuscated with alternate values

Another common scenario is allowing testing of new


• Regular Expression Masking - The value of a column can
be obfuscated via a regular expression statement
systems with realistic data without exposing sensitive
information to testing staff who may not have appropriate Design parameters
security clearance to view such information. And, as realistic The Data Masking feature has been developed with the
data is used, there is no need to change any applications. following design parameters in consideration:

Non-reversible
It should be possible to mask data such that the original
sensitive value cannot be derived from it.
Data Masking provides this ability in all three masking types
(full, partial and regular expression) by allowing replacement
characters to be specified. Where meaningful obfuscated
values are required, post-masking processing is easily
applied severing any relationship between the original and
obfuscated values.
Figure 2 - Offline masking

3 types of data redaction available


Our Data Masking increases the safety of your data
● Full masking - Redacts the entire specified column with replacement values
● Partial masking - Masks only portion of the specified column
Page 5 of 8 fast.fujitsu.com
● Regular expression masking - Applies a regular expression to the column's value
White paper - Best practices for sensitive data - using Data Masking

Flexible and easy to use Maintenance of referential integrity


There are many business reasons for the obfuscation and As policies are applied at data access time, data integrity is
protection of sensitive data, and each may have its own maintained in the source system. When generating the test
preferred solution. Fujitsu's goal is to provide architecture environments (offline approach), it becomes more of a
and tools that are flexible enough together to provide as design issue in the use of data masking policies and post
wide a selection of quality solutions as possible. masking processing to maintain referential integrity.
Unfortunately, with flexibility, often comes complexity.
Repeatable representation
Fujitsu's Data Masking feature has managed to avoid this
It is important when dealing with testing that test cases are
compromise by building on top of a clear architectural
reproducible. Therefore, a masking process should be able
design and complementing existing data security features
to reproduce the same masked data each time it is run.
rather than competing with them.
While a generated test database can always be backed up
By applying masking policies at the time, the data is
and restored for each test phase, it is often necessary to
accessed, policies can be configured to alter data for
regenerate the data again from production for a number of
specific conditions, such as a particular application role,
reasons. In this situation it is often a requirement to ensure
providing greater flexibility.
masked values used in previous tests are consistent.
A heightened level of security can be applied to the
The policy implementation provided by Fujitsu ensures that
sensitive data stored on disk by utilizing Fujitsu's Transparent
masking is consistent each time it is applied.
Data Encryption.
Policies are easily created and modified. The example below Conclusion
shows how an existing policy can be modified to add a new It is imperative that your organization applies best practices
partial masking column called "cc_num" that stores credit for sensitive data, not only to comply with regulations
card numbers with only the last four digits to be readable. governing data management—in particular, those relating to
protecting the privacy of customer information—but to
postgres=# ALTER TABLE emp
postgres-# ADD COLUMN (cc_num text); maintain customer trust. Fujitsu's Data Masking feature
ALTER TABLE
provides an easy-to-use and flexible method of providing
postgres=# INSERT INTO emp
postgres-# VALUES (9, 'John Smith', '3453-3454-5343-
just the right amount of sensitive data to those who need it.
3433'); That includes safely sharing production data with
INSERT 0 1
nonproduction users in development and test environments.
postgres=# select pgx_alter_confidential_policy
postgres-#
postgres-#
(table_name
policy_name
:= 'emp'
:= 'policyone' ,
, References
postgres-# action := 'ADD_COLUMN' ,
postgres-# column_name := 'cc_num' , 1. Norton, Steven. (2015, March 12). "Most Companies Fail
postgres-# function_type := 'PARTIAL' , Compliance Tests for Payment Data Security: Report" (The
postgres-# function_parameters := 'VVVVFVVVVFVVVVFVVVV,
postgres-# VVVV-VVVV-VVVV-VVVV, *, 0, 12'); Wall Street Journal)
postgres=# SELECT * from emp;
id | name | cc_num Read more
--------------------------------------
9 | John Smith | ****-****-****-3433 To learn more about Fujitsu Enterprise Postgres capabilities
to realize a thorough data security strategy, we recommend:
Maintenance of original representation
• Transparent Data Encryption white paper
Data masking policies are applied at the time the data is
accessed. Queried data is modified according to the
• Dedicated Audit Log white paper
masking policy before being returned up the query chain. • High Availability white paper
This allows policies to be disabled and enabled, or even • Fujitsu Enterprise Postgres Resource Center webpage
configured to only be applied for specific roles or conditions,
so that the original data can still be viewed with appropriate Contact us
privileges. If you would like to find out more about Fujitsu Enterprise
Postgres, contact us at [email protected].

Our PostgreSQL experts are at hand


Our PostgreSQL experts contribute to the community in a variety of activities, from
feature development to code reviews, and test coverage.
If you have any concerns about the security of your data or would like to find out more
Page 6 of 8 fast.fujitsu.com
about Fujitsu Enterprise Postgres, please contact us at [email protected]
White paper - Best practices for sensitive data - using Data Masking

Fujitsu Enterprise Postgres can help your journey


Fujitsu Enterprise Postgres is the enhanced version of PostgreSQL, for enterprises seeking a more robust,
secure, and fully supported edition for business-critical applications.
It is fully compatible with PostgreSQL and shares the same operation method, interface for application
development, and inherent functionality. Designed to deliver the Quality of Service (QoS) that
enterprises demand of their databases in the digital world, while supporting the openness and
extensibility expected of open source platforms, all at a lower cost than traditional enterprise databases.

Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres
for Kubernetes on IBM LinuxONE™ on IBM Power®

Combine the strengths of Utilize operator capabilities World-class platform that Experience frictionless
open-source PostgreSQL for provisioning and embraces open source hybrid cloud that can help
with the enterprise managing operations on the and improves data you modernize to respond
features developed by OpenShift Container security, performance, faster to business
Fujitsu. Platform. and business continuity. demands.

Enhanced speed, security, Business-ready database The best of open source Fujitsu database designed
and support — without that integrates container flexibility with the peace for security, performance,
the costs associated operation technology for of mind that comes from and reliability, combined
with most proprietary rapid development-to- knowing it is backed by with IBM server built for
systems. production deployments. Fujitsu and IBM. agility in the hybrid cloud.

Page 7 of 8 fast.fujitsu.com
White paper - Best practices for sensitive data - using Data Masking

Discover how Fujitsu Enterprise Postgres' unique


security features take PostgreSQL to the next level to
protect you from data breaches and ensure you comply
with data protection regulations such as GDPR at
fast.fujitsu.com/enhanced-security-for-enterprises/

Contact
Fujitsu Limited
Email: [email protected]
Website: fast.fujitsu.com

2024-04-02 WW EN

Copyright 2024 Fujitsu Limited. Fujitsu, the Fujitsu logo and Fujitsu brand names are trademarks or registered trademarks of Fujitsu
Limited in Japan and other countries. Other company, product and service names may be trademarks or registered trademarks of their
respective owners. All rights reserved. No part of this document may be reproduced, stored or transmitted in any form without prior
written permission of Fujitsu Australia Software Technology. Fujitsu Australia Software Technology endeavors to ensure the information in
Page 8 of 8 fast.fujitsu.com
this document is correct and fairly stated, but does not accept liability for any errors or omissions

You might also like