Best Practice Guidance from Camouflage Mask sensitive data to

Highlights
• Prevent abuse of sensitive data
in non-production environments,
enhancing data security for
outsourced application development
• Useable, realistic data for
application developers, trainers and
testers without exposing sensitive
production data
• Assist organizations in meeting
regulatory compliance requirements
• Avoid common compliance pitfalls
and facilitate rapid implementation
• Ensure data masking supports
organizational business processes
for development, testing, quality
assurance, training, outsourcing or
offshoring
Mask sensitive data to protect against privacy breach, ensure
regulatory compliance, and improve operational efficiency with
industry leading technology and expert guidance from Camouflage
Organizations today know the value in protecting their sensitive data. Exposing sensitive information can have
severe consequences to the corporate health and image ofthe organization. Therefore, organizations must take
a proactive approach in protecting, securing and ultimately preventing an event resulting in potentially brand
damaging consequences.
Camouflage Enterprise Data Masking disguises copies of production databases to create realistic and fully
functional data required for use in nonproduction environments. A comprehensive application used to protect
personal and other sensitive information, the solution intuitively handles a wide range of data masking
requirements from individual departmental needs through to the complex demands of the enterprise. Coupled
with a veteran team of data masking experts and best practice guidance, Camouflage offers a proven and
comprehensive approach to securing sensitive data. Users can either mask data in a single database, or across
multiple databases and platforms enterprise-wide, all the while ensuring that the newly masked data behaves
like the original.
Best Practice Guidance from Camouflage
The diagram below outlines the four phases of the Camouflage Data Masking Best Practice and highlights the
steps involved in implementing a data masking solution.
• Minimize risk with industry-specific
best practices validated through time
tested implementations
• Understand the human capital
requirements for data masking and
the typical duration of the
investment
Inputs
Guidance on automation and
repeatability to minimize the
requirement foryour time and
resources
•
Outputs
• Leverage Camouflage's expertise
and leadership in data masking
including professional services and
online e-Iearning with Camouflage
Campus Portal.
./
Data Classification
Functional Data
System Def inition
Security Policies
and Procedures
Requireme nts
DBPoliciesand
Procedures
Strategies
Data Masking
Threat M odeling
Fit/GapAnalysis
Environment
Requirements
Risk Posture
GRC Requirements
Training
Search
Configuratio ns
./ Draft Functional
Masking Docum en t
.;' Success criteria
,/ Detailed Funct io na l
Masking Document
,/ Refin ed Search
Con figura tions
,/ Accep table Risk
Profile
,/ Solu tion
Architecture
Create Masking
Configurations
Develop
Customizatio ns
QA & Acceptance
Planning
Change
Create Backup /
Resto re jobs
Create Masking
Jobs
Con figure
Execution Schedule
Operat io ns
Training &
Handover
Management
Planning
,/ Mas king/Subset
Configuratio ns
,/ Dat aMasking
Solution Guide
,/ Test Plans
,/
,/
,/
,/
Change
Management
Process
Change Audit
Pro cess
Solution
Docum entation
Data M asking COE
Discover - Retrieve and analyze sensitive data
Individual customer needs for a data masking solution vary widely depending on the size of the organization,
complexity of the data, scope of the data masking project, and number of applications and projects involved.
The goal ofthe Discover phase isto identify the data thatmust be masked to sufficiently protect the data without
compromising data utility.
Databases Supported
•
•
•
•
Oracle®
IBM® DB2®
Microsoft® SQL Server®
SAP® ASE®
• MySQL®
• Teradata®
• DB2®
• VSAM
• IMS
Design - Establish context for discovered data
Data discovered during the Discover phase is used to establish criteria for masking the data and develop the
Functional Masking Document.
Develop - Create data masking configurations
Data masking configurations are created based upon customer-specific Functional Masking Requirements
defined inthe prior phases. Consideration isgiven to how the data masking configurations will be integrated into
the refresh process.
Deploy - Integrate data masking in the business process
Data masking is transitioned into the refresh process for non-production environments taking the overall
business processes into account. This phase entails executing configurations constructed during the Develop
Phase - such as creating database subsets and deploying data masking job scheduling scripts.
Products Powering the Solution
Atthe heart of the Camouflage Data Masking Solution are the robust products thatpower it at every step along
the way.
Camouflage Discovery
Camouflage Discovery's full featured search engine and data analysis tool provides sophisticated pattern
based searching that uncovers the type and location of sensitive data. The data classification functionality
automatically categorizes discovered data according to classification schemes that best represent your
sensitive data and intended uses.
Features and Benefits
• Eliminate risk of disclosure of
sensitive data in testing, training,
and development environments
• Retain statistical properties, integrity,
and realism of the original data
• Enterprise-class scalability and
collaboration
• Broad platform support
• Centralized Repository, Sophisticated
Search Engine, and Sensitive Data
Analysis Reports to provide insight
intothe sensitive data landscape
with Discovery
• Reduce data footprint with
Subsetting
Camouflage Masking
The core of the Camouflage Data Masking Solution isCamouflage Masking which applies sophisticated data
transformation techniques to databases containing sensitive data. This results in realistic data thatenables
non-production users to meet their objectives without risking exposure of personally identifiable or
otherwise sensitive information.
Camouflage Subsetting
Camouflage Subsetting is designed to create smaller target databases that retain the original database's
referential integrity, for use in testing, application development and training environments. Our advanced
subsetting engine connects to multiple databases and database types, allowing your organization to create
subsets of data from several business lines.
Camouflage Database Unity Framework
Camouflage Database Unity Framework automatically maintains consistent data relationships across multiple
databases, database types, applications, and over time, regardless of the underlying platform or database.
Training and Professional Services
The best way to ensure an efficient and successful data masking implementation within your organization isto
ensure that your team receives guidance and training from the experts.
Camouflage Campus Portal is an on-demand e-Iearning environment designed specifically for partners
• Maintain application and database
integrity and consistency with
Database Unity Framework
and end users ofCamouflage products. Delivered completely online, Campus Portal offers self-paced training
courses, interactive workshops, and progress assessments to help you quickly and affordably gain expertise
in Camouflage products and methodologies and maximize your software investment.
Camouflage Professional Services provides superior data discovery, classification and masking consulting services, with some of the industry's most experienced professionals. Whether you are looking for consulting to support a software license, or to complete a data masking project purely on a consulting basis,
Camouflage has an array of options thatcan be tailored to your organization's unique needs.
For more infomation contact Camouflage at info@datamasking.com, 1.866.345.8888
orvisit www.datamasking.com