WhitePaper DataMasking
WhitePaper DataMasking
sensitive data
using Data Masking
White paper
Page 1 of 8 www.fast.fujitsu.com/
White paper - Best practices for sensitive data - using Data Masking
Hackers have stolen headlines across the world with highly On the technology side, many organizations now manage
publicized information security breaches over the last few access (authorization) to data at the application layer, using
years. Some of these, such as the hacking of the Australian various security frameworks that come embedded within
Bureau of Meteorology, increase the public's awareness and their chosen application development framework. These
general acceptance of data vulnerability in today's society. often see a single generalized database role with an
elevated degree of privileges being used by all requests
While average consumers are mindful of public
from one or more applications. In some instances, the
recommendations on how to protect their personal data, the
superuser role is even used.
convenience of online shopping, bill paying and the draw of
social media is overpowering. This often leads to increasingly Organizations must take responsibility and put more focus
placed trust in those organizations to which they supply on the management of sensitive data.
personal information. Most organizations store data in one type of database or
another, as this is the most efficient way of finding
information when it comes to using it. So this is where
security of data must begin.
Similar recommendations can be found in the results of • Removal of data when no longer required
compliance audits of many of today's data compliance • Only allowing access to data if needed
regulations. Fujitsu Enterprise Postgres already implements strong
Causes of noncompliance measures for protecting sensitive data. In addition to correct
placement (that is, behind an appropriately configured
Some root causes contributing to such a high degree of
firewall), it also provides:
organizational noncompliance with regulations include:
• Sharing of customer data with business partners or • Configuration of which servers to allow connections from
market research organizations • Host based authentication
• Duplication of production data into development and test • Encryption of underlying data with Transparent Data
environments Encryption
• Addition of applications to existing production data • Row-Level Security to restrict access to row data
where security was moved from the data source layer into With the new Data Masking feature in Fujitsu Enterprise
the application layer Postgres, sensitive data is only made available to people
Publication of noncompliance has resulted in protection of who need it, and even then, that data can be partially
sensitive data in nonproduction environments coming to the obfuscated.
forefront of IT tasks in current years.
In order for organizations to meet these challenges and fulfil
their compliance obligations, best practices for sensitive
data are gaining significance and seeing a greater rate of
adoption.
Non-reversible
It should be possible to mask data such that the original
sensitive value cannot be derived from it.
Data Masking provides this ability in all three masking types
(full, partial and regular expression) by allowing replacement
characters to be specified. Where meaningful obfuscated
values are required, post-masking processing is easily
applied severing any relationship between the original and
obfuscated values.
Figure 2 - Offline masking
Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres Fujitsu Enterprise Postgres
for Kubernetes on IBM LinuxONE™ on IBM Power®
Combine the strengths of Utilize operator capabilities World-class platform that Experience frictionless
open-source PostgreSQL for provisioning and embraces open source hybrid cloud that can help
with the enterprise managing operations on the and improves data you modernize to respond
features developed by OpenShift Container security, performance, faster to business
Fujitsu. Platform. and business continuity. demands.
Enhanced speed, security, Business-ready database The best of open source Fujitsu database designed
and support — without that integrates container flexibility with the peace for security, performance,
the costs associated operation technology for of mind that comes from and reliability, combined
with most proprietary rapid development-to- knowing it is backed by with IBM server built for
systems. production deployments. Fujitsu and IBM. agility in the hybrid cloud.
Page 7 of 8 fast.fujitsu.com
White paper - Best practices for sensitive data - using Data Masking
Contact
Fujitsu Limited
Email: [email protected]
Website: fast.fujitsu.com
2024-04-02 WW EN
Copyright 2024 Fujitsu Limited. Fujitsu, the Fujitsu logo and Fujitsu brand names are trademarks or registered trademarks of Fujitsu
Limited in Japan and other countries. Other company, product and service names may be trademarks or registered trademarks of their
respective owners. All rights reserved. No part of this document may be reproduced, stored or transmitted in any form without prior
written permission of Fujitsu Australia Software Technology. Fujitsu Australia Software Technology endeavors to ensure the information in
Page 8 of 8 fast.fujitsu.com
this document is correct and fairly stated, but does not accept liability for any errors or omissions