In this session, Michael Jay Freer will explore defining a common data-masking language, defining standard masking business-rules, defining best practices for manipulating the data, and how to get started without attempting to "Boil-the-ocean."
2. Michael Jay Freer, SSGB, ITIL(v3), -
Information Management professional providing
thought leadership to fortune 500 companies
including MetLife Bank, Tyco Safety Products,
Capital One, Brinks Home Security, and Zales.
Over his 25+ years experience he has worked with
business executives providing solutions in
Michael Jay Freer - Presenter Bio
business executives providing solutions in
financial management, manufacturing, supply
chain management, retail, marketing, and hospitality industries.
As an Enterprise Architect at MetLife Bank, Michael Jay specialized in
Information Obfuscation facilitating project solutions for protecting
business Confidential and Restricted data.
Slide# 2
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
4. Agenda
Outlining the Problem
Data Masking Golden Rule
Defining Information Obfuscation
Information Classification
Slide# 5
All rights reserved
Information Classification
Who is Responsible
Defining a Common Language
Data-Centric Development
Governance
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
5. Outlining the Problem
Problem Statement
Corporate Data breaches are occurring at an alarming rate.
1) It is incumbent on organizations to protect the customer,
partner, and employee data with which they are entrusted
2) Ease of access to sensitive information in business systems
3) Using unmasked Confidential and Restricted data in non-
production environments exposes risks to company reputationproduction environments exposes risks to company reputation
Business Rationale for Obfuscating Data
• Reduce Data Breach Risks
• Heightened Legal and Regulatory scrutiny of data-protection
services (i.e.: SOX, HIPAA, GLBA, NPPI, FFIEC, PCI-DSS)
• Company Policies and Standards
• Fundamental assumption on the part of customers that their data
is already de-identified in non-production systems
Slide# 6
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
6. Outlining the Problem
Problem Statement
Corporate Data breaches are occurring at an alarming rate.
1) It is incumbent on organizations to protect the customer,
partner, and employee data with which they are entrusted
2) Ease of access to sensitive information in business systems
3) Using unmasked Confidential and Restricted data in non-
production environments exposes risks to company reputationproduction environments exposes risks to company reputation
Business Rationale for Obfuscating Data
• Reduce Data Breach Risks
• Heightened Legal and Regulatory scrutiny of data-protection
services (i.e.: SOX, HIPAA, GLBA, NPPI, FFIEC, PCI-DSS)
• Company Policies and Standards
• Fundamental assumption on the part of customers that their data
is already de-identified in non-production systems
Slide# 8
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
7. Data Masking Golden Rule
To put Information Obfuscation (Data Masking) into
perspective simply think about yourself:
How many vendors or service-providers have your
personal information (banks, mortgage holders
physicians, pharmacies, retailers, schools you applied
to, utilities, cellular carriers, internet providers, etc.)?to, utilities, cellular carriers, internet providers, etc.)?
Michael Jay’s Data Masking Golden Rule
“Do unto your company’s corporate data-assets as you
would have your banker, healthcare provider, or favorite
retailer do unto your personal information.”
(Use this as your compass to navigate)
Slide# 10
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
8. Defining Information Obfuscation
Definition
Information Obfuscation is the effort in both Business
Operations and non-production systems to protect business
Confidential and Restricted data from easy access or
visibility by unauthorized parties.
Framework
For our purposes, Information Obfuscation includes access
management, data masking, encryption of data-at-rest
(DAR) and encryption of data-in-transit including
principles for protecting business communications.
Slide# 11
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
9. Information Classification
Sensitive Data
“Sensitive” is a broad term for information considered to be
a business trade-secret; or considered private by regulatory
rule, legal act, or trade association (i.e.: GLBA, HIPAA,
FFIEC, PCI, PHI, PII).
Slide# 12
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
10. Information Classification
Information Classification Levels
Public – non-sensitive data, disclosure will not violate
privacy rights
Internal Use Only – generally available to employees and
approved non-employees. May require a non-disclosure
agreement.agreement.
Confidential – intended for use only by specified employee
groups. Disclosure may compromise an organization,
customer, or employee.
Restricted – very sensitive, intended for use only by named
individuals.
Sealed – extremely sensitive, irreparable destruction of
confidence in and reputation of the organization
Slide# 18
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
11. Information Classification
Information Classification Levels
Public – non-sensitive data, disclosure will not violate
privacy rights
Internal Use Only – generally available to employees and
approved non-employees. May require a non-disclosure
agreement.agreement.
Confidential – intended for use only by specified employee
groups. Disclosure may compromise an organization,
customer, or employee.
Restricted – very sensitive, intended for use only by named
individuals.
Sealed – extremely sensitive, irreparable destruction of
confidence in and reputation of the organization
Slide# 19
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
12. Who is Responsible
You are!
No matter your role in the organization, you are
responsible for protecting the “corporate data-assets.”
Everyone else is also responsible
All of your peers are also responsible for protecting theAll of your peers are also responsible for protecting the
Corporate Data-Assets.
However, you don’t have control over your peers, only
over your own vigilance and how you make your
management aware of any concerns, risk, or issues with the
security of the Corporate Data-Assets.
Slide# 22
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
13. Defining a Common Language
Communication
The Business-Information Owner, Project Stakeholders,
Development Teams, and Support Teams need to use a
common language when discussing the various obfuscation
methods and where in the environment lifecycle an action
will occur.will occur.
Slide# 23
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
14. Defining a Common Language
Communication
The Business-Information Owner, Project Stakeholders,
Development Teams, and Support Teams need to use a
common language when discussing the various obfuscation
methods and where in the environment lifecycle an action
will occur.will occur.
Slide# 24
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
15. Defining a Common Language
What are we talking about?
Information obfuscation includes any practice of concealing,
restricting, fabricating, encrypting, or otherwise obscuring
sensitive data.
This is usually thought of in the context of non-productionThis is usually thought of in the context of non-production
systems but it really encompasses the full information
management lifecycle from onboarding of data to
developing new functionality to archiving and purging
historical data.
Slide# 25
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
16. Common Language – Environment Lifecycle
Common Environments
1. Development – Code is created, modified and unit tested
2. Testing / QA – System, integration, & regression testing
3. User Acceptance (UAT) – Business-user validation
Test new business requirements and regression testTest new business requirements and regression test
existing functionality
4. Business Operations – Day-to-day business
environment
5. Business Support – Replicate and troubleshoot business
issues
Slide# 26
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
17. Common Language – Environment Lifecycle
Common Environments
1. Development – Code is created, modified and unit tested
2. Testing / QA – System, integration, & regression testing
3. User Acceptance (UAT) – Business-user validation
Test new business requirements and regression testTest new business requirements and regression test
existing functionality
4. Business Operations – Day-to-day business
environment
5. Business Support – Replicate and troubleshoot business
issues
Slide# 27
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
18. Common Language – Environment Lifecycle
Other Possible Environments
Isolated Onboarding – When data from 3rd party
partners are transitioned in, there may requirements for a
secured environment to cleanse and prepare data for
integration into the business operations environments
Isolated Data-Masking – Unmasked Confidential and
Restricted data should not be transferred to non-production
environments. A separate secure environment allows for
standardized data masking in-place
Slide# 29
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
19. Common Language – Environment Lifecycle
Other Possible Environments
Isolated Onboarding – When data from 3rd party
partners are transitioned in, there may requirements for a
secured environment to cleanse and prepare data for
integration into the business operations environments
Isolated Data-Masking – Unmasked Confidential and
Restricted data should not be transferred to non-production
environments. A separate secure environment allows for
standardized data masking in-place
Slide# 31
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
20. Common Language – Environment Lifecycle
Other Possible Environments
Isolated Onboarding – When data from 3rd party
partners are transitioned in, there may requirements for a
secured environment to cleanse and prepare data for
integration into the business operations environments
Isolated Data-Masking – Unmasked Confidential and
Restricted data should not be transferred to non-production
environments. A separate secure environment allows for
standardized data masking in-place
Slide# 32
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
21. Common Language – Environment Lifecycle
Other Possible Environments
Isolated Onboarding – When data from 3rd party
partners are transitioned in, there may requirements for a
secured environment to cleanse and prepare data for
integration into the business operations environments
Isolated Data-Masking – Unmasked Confidential and
Restricted Data should not be transferred to non-
production environments. A separate secure environment
allows for standardized data masking in-place
Slide# 33
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
22. Common Language – Environment Lifecycle
Other Possible Environments
Isolated Onboarding – When data from 3rd party
partners are transitioned in, there may requirements for a
secured environment to cleanse and prepare data for
integration into the business operations environments
Isolated Data-Masking – Unmasked Confidential and
Restricted Data should not be transferred to non-
production environments. A separate secure environment
allows for standardized data masking in-place
Slide# 34
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
23. Common Language – Masking Taxonomy
Methods of Obfuscating Information
Pruning Data
Concealing Data
Fabricating Data
Trimming DataTrimming Data
Encrypting Data
Separating Data
Slide# 36
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
24. Common Language – Where to Obfuscate
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Data Movement – Data can be removed, shorten, or encrypted
Data Stores – Data can be encrypted, data-at-rest (DAR)
Interactive User Interfaces – Only show required data or portions
of attributes for identification (i.e. account#, license#, SS#)
Static Reporting – More restrictive than Interactive User Interfaces
Develo
DataSto
Encrypte
En
Slide# 37
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
25. Common Language – Where to Obfuscate
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Data Movement – Data can be removed, shorten, or encrypted
Data Stores – Data can be encrypted, data-at-rest (DAR)
Interactive User Interfaces – Only show required data or portions
of attributes for identification (i.e. account#, license#, SS#)
Static Reporting – More restrictive than Interactive User Interfaces
Develo
DataSto
Encrypte
En
Slide# 38
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
26. Common Language – Where to Obfuscate
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Data Movement – Data can be removed, shorten, or encrypted
Data Stores – Data can be encrypted, data-at-rest (DAR)
Interactive User Interfaces – Only show required data or portions
of attributes for identification (i.e. account#, license#, SS#)
Static Reporting – More restrictive than Interactive User Interfaces
Develo
DataSto
Encrypte
En
Slide# 39
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
27. Common Language – Where to Obfuscate
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Data Movement – Data can be removed, shorten, or encrypted
Data Stores – Data can be encrypted, data-at-rest (DAR)
Interactive User Interfaces – Only show required data or portions
of attributes for identification (i.e. account#, license#, SS#)
Static Reporting – More restrictive than Interactive User Interfaces
Develo
DataSto
Encrypte
En
Slide# 40
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
28. Common Language – Where to Obfuscate
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Data Movement – Data can be removed, shorten, or encrypted
Data Stores – Data can be encrypted, data-at-rest (DAR)
Interactive User Interfaces – Only show required data or portions
of attributes for identification (i.e. account#, license#, SS#)
Static Reporting – More restrictive than Interactive User Interfaces
Develo
DataSto
Encrypte
En
Slide# 41
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
29. Common Language – Masking Taxonomy
Methods of Obfuscating Information
Pruning Data
Concealing Data
Fabricating Data
Trimming DataTrimming Data
Encrypting Data
Separating Data
Slide# 42
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
30. Common Language – Pruning Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Pruning Data: Removes sensitive data from attributes
in non-production environments. The attributes will still
appear on data entry screens and reporting but be left blank.
Develo
DataSto
Encrypte
En
Slide# 43
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
31. Common Language – Pruning Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Example
Pruning Data: Removes sensitive data from attributes
in non-production environments. The attributes will still
appear on data entry screens and reporting but be left blank.
Develo
DataSto
Encrypte
En
Slide# 44
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Executive Salaries: Employee personnel records
can de-identify by changing Emp#, SS#, & names but
executive management records are easily tied back to
the organizational hierarchy (e.g., top 10 salaries).
Example
32. Common Language – Concealing Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Concealing Data: Removes sensitive data from user
access and visibility. For data entry screens and reports, the
attribute does not appear at all versus being Pruned (blank).
Concealing data depends on clear rules for Access, Authentication, and
Accountability.
Develo
DataSto
Encrypte
En
Slide# 45
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
33. Common Language – Concealing Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Concealing Data: Removes sensitive data from user
access and visibility. For data entry screens and reports, the
attribute does not appear at all versus being Pruned (blank).
Concealing data depends on clear rules for Access, Authentication, and
Accountability.
Develo
DataSto
Encrypte
En
Slide# 46
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Bank / Loan Account#: Bank web sites generally
do not display account numbers even to the account
holder.
Example
34. Common Language – Fabricating Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Fabricating Data (synthetic data):
1) Creating data to replace sensitive data
2) Creating data to facilitate full functional testing
3) Creating date for negative testing (error handling)
Develo
DataSto
Encrypte
En
Slide# 47
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
35. Common Language – Fabricating Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Example
Fabricating Data:
1) Creating data to replace sensitive data
2) Creating data to facilitate full functional testing
3) Creating date for negative testing (error handling)
Develo
DataSto
Encrypte
En
Slide# 48
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Contact ame or ID#:
Replacing contact name and ID# is the standard
method for de-identifying customer and employee
records.
Example
36. Common Language – Trimming Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Trimming Data: Removes part of an attribute’s value
versus Pruning which removes the entire attribute value.
Develo
DataSto
Encrypte
En
Slide# 49
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
37. Common Language – Trimming Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Example
Trimming Data: Removes part of an attribute’s value
versus Pruning which removes the entire attribute value.
Develo
DataSto
Encrypte
En
Slide# 50
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Social Security# and Credit Card#:
Changing SSN# from 123-45-6789 to XXX-XX-6789
(or a new attribute = 6789) so that only part of the
information is available, usually for identification.
Example
38. Common Language – Encrypting Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Encrypting Data: Encryption can be done at the
attribute, table, or database levels
(Encrypted data can be decrypted back to the original value)
Develo
DataSto
Encrypte
En
Slide# 51
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
39. Common Language – Encrypting Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Encrypting Data: Encryption can be done at the
attribute, table, or database levels
(Encrypted data can be decrypted back to the original value)
Develo
DataSto
Encrypte
En
Slide# 52
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
40. Common Language – Encrypting Data
opmentEnvironment
orage
ed
ncrypted
DataMovement
Encrypted
Credit Card#: Credit card numbers are often encrypted
for data transmission for FFIEC and PCI DSS compliance.
Example
Encrypting Data: Encryption can be done at the
attribute, table, or database levels
(Encrypted data can be decrypted back to the original value)
Develo
DataSto
Encrypte
En
Slide# 53
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
for data transmission for FFIEC and PCI DSS compliance.
Encrypting credit card numbers at rest (DAR) provides
additional security.
Credit Card# is an example of an attribute that often falls into
multiple Obfuscation Methods.
41. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Mo
to
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Slide# 54
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
42. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Mo
to
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Slide# 55
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
43. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Mo
to
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Slide# 56
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
44. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Mo
to
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Slide# 57
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
45. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Mo
to
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Slide# 58
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
46. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 59
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
47. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 60
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
48. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 61
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
49. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 62
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
50. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 63
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
51. oveSensitiveData
oaSecuredTable
Common Language – Separating Data
Data Separation: Moves sensitive data into multiple
tables. Data can still be joined but Sensitive and Non-
sensitive attributes do not reside in a single record.
Mo
to
Slide# 64
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
52. Common Language – Masking Taxonomy
Prune – Removes values from non-production systems. Attribute
appears on data entry screens and reporting but are blank.
Conceal – Removes sensitive data from user access or visibility. For
data entry screens and reports, the attribute may not appear at all or be
obscured versus being Pruned (blank).
Fabricate – Creating data to replace sensitive data and facilitate
proper application testing.proper application testing.
Trim – Removes part of a data attribute’s value (Pruning removes the
entire attribute value)
Encrypt – Unlike Fabricated Data, encrypted data can be decrypted
back to the original value.
Data Separation – Moves specific segments of data or individual
datum into separate tables / databases to limit user access or visibility
Slide# 65
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
53. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, AccessIssueSuppQualityAssuranceDevelopmentStaff
Slide# 67
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
54. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
Environments
Users groups
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 68
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Environments
Obfuscation Method
55. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
BusinessEnd-users
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 69
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
BusinessEnd
56. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
BusinessSupport
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 70
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
BusinessSupport
57. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
UserAcceptance
(UAT)
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 71
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
UserAcceptance
(UAT)
58. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
QA/Testing
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 72
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
QA/Testing
59. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
Development
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 73
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Development
60. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
Business End-users
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 74
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
61. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
Support Staff
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 75
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Support Staff
62. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, AccessIssueSuppQualityAssuranceDevelopmentStaff
Slide# 76
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
QA Testing Team
63. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, AccessIssueSuppQualityAssuranceDevelopmentStaff
Slide# 77
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Development Team
64. BusinessEnd-UserAccessportStaff
Matrix – Method, Environment, Access
Developers in
developersin
DevelopmentEnv
IssueSuppQualityAssuranceDevelopmentStaff
Slide# 78
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
Developers in
Non-development
Environments
Non-developersin
DevelopmentEnv
65. BusinessEnd-UserAccessortStaff
Matrix – Method, Environment, Access
No Access to
IssueSuppoQualityAssuranceDevelopmentStaff
Slide# 79
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
No Access to
environment or data
66. BusinessEnd-UserAccessortStaff
Matrix – Method, Environment, Access
Last Four Digits
IssueSuppoQualityAssuranceDevelopmentStaff
Slide# 80
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
67. BusinessEnd-UserAccessortStaff
Matrix – Method, Environment, Access
Fabricate Data
IssueSuppoQualityAssuranceDevelopmentStaff
Slide# 81
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
68. BusinessEnd-UserAccessortStaff
Matrix – Method, Environment, Access
Not Acknowledged
IssueSuppoQualityAssuranceDevelopmentStaff
Slide# 82
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
69. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 84
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
70. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 86
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
71. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 87
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
72. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 88
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
73. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 89
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
74. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set
including the items above and is likely to be a combination of
fabricated and masked data
Slide# 90
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
75. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set,
including the items above, and is likely to be a combination
of fabricated and masked data (de-identified records)
Slide# 91
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
76. Data-Centric Development
Projects that center around data analysis (i.e.: dashboards, BI,
data-marts / warehouses, etc.) often claim that they must have
“production data” to develop the solution.
It is true that the business will need production data for user
acceptance testing (UAT) but let’s consider a few other facts:
1) Negative testing will require fabricated data
2) New functionality will also likely require fabricated data
3) Existing production data may not contain all possible values
or permutations of data so full positive testing will also
require some level of fabricated data
4) Full regression testing will require a standardized test set,
including the items above, and is likely to be a combination
of fabricated and masked data (de-identified records)
Slide# 92
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
77. Governance
Data stewardship is a key success factor for good data
governance and in this case for good Information
Obfuscation.
No one person will be aware of every government
regulation, trade association guideline, business functional
requirement, or company policy.requirement, or company policy.
Include representatives from data stewardship, security,
internal audit, and quality assurance teams in your solution
planning and project development teams.
Slide# 93
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
78. Information Obfuscation Summary
1. Obfuscation occurs throughout the information lifecycle
not just in non-production environments
2. Everyone is responsible for protecting the corporate data
assets and the best data security tool is vigilance
3. Use a defined language to communicate who, what,
where, when, why, and how obfuscation will occurwhere, when, why, and how obfuscation will occur
4. Make Information Obfuscation part of your
organization’s business-as-usual (BAU) processes
5. Follow Michael Jay’s Data Masking Golden Rule
“Do unto your company’s corporate data-assets as you
would have your banker, healthcare provider, or retailer
do unto your personal information.”
Slide# 99
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
82. Legal & Regulatory Alphabet Soup (Sampling)
GLBA – The Gramm–Leach–Bliley Act allowed consolidation
of commercial & investment banks, securities, & insurance co.
PPI – Nonpublic Personal Information - Financial
consumer’s personally identifiable information (see GLBA)
OCC – Office of the Controller of Currency regulates banks.
PCI – Payment Card Industry; defines Data Security StandardPCI – Payment Card Industry; defines Data Security Standard
(PCI DSS) processing, storage, or transmitting credit card info.
PHI – Patient Health Information - Dept of Health & Human
Services (“HHS”) Privacy Rule (see HIPAA).
PII – Personally Identifiable Information; used to uniquely
identify an individual. (Legal definitions vary by jurisdiction.)
Slide# 103
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer
83. Sample Cross Reference Chart
Data Point
PII
PCI PPI PHI
Customer - The Fact That an Individual is a Customer ** X
First, or Last Name *; Mother's Maiden Name X X
Country, State, Or City Of Residence * X X
Telephone# (Home, Cell, Fax) X X
Birthday, Birthplace, Age, Gender, or Race *
Social Security#, Account#, Driver's License#, National ID
++
X X
Passport#, Issuing Country
Credit Card Numbers, Expiration Date, Credit Card Security Code X XCredit Card Numbers, Expiration Date, Credit Card Security Code X X
Credit Card Purchase X
Grades, Salary, or Job Position *
Vehicle Identifiers, Serial Numbers, License Plate Numbers X
Email - Electronic Mail Addresses; IP Address, Web URLs X
Biometric Identifiers, Face, Fingerprints, or Handwriting
Dates - All Elements of Dates (Except Year +) X
Medical Record#, Genetic Information, Health Plan Beneficiary# X
* More likely used in combination with other personal data
** GLBA regulation to fall into the “Restricted” classification
+ All elements of dates (including year) if age 90 or older
++ Varies by Jurisdiction
Slide# 104
All rights reserved
MJFreer@QualityBI.com
(954) 249-1530 Michael Jay Freer