Best Practices For Ensuring Data Privacy in Nonproduction Systems With Data Masking
Best Practices For Ensuring Data Privacy in Nonproduction Systems With Data Masking
Best Practices For Ensuring Data Privacy in Nonproduction Systems With Data Masking
W H I T E PA P E R
This document contains Confidential, Proprietary and Trade Secret Information (“Confidential Information”) of
Informatica Corporation and may not be copied, distributed, duplicated, or otherwise reproduced in any manner
without the prior written consent of Informatica.
While every attempt has been made to ensure that the information in this document is accurate and complete, some
typographical errors or technical inaccuracies may exist. Informatica does not accept responsibility for any kind of
loss resulting from the use of information contained in this document. The information contained in this document is
subject to change without notice.
The incorporation of the product attributes discussed in these materials into any release or upgrade of any
Informatica software product—as well as the timing of any such release or upgrade—is at the sole discretion of
Informatica.
Protected by one or more of the following U.S. Patents: 6,032,158; 5,794,246; 6,014,670; 6,339,775; 6,044,374;
6,208,990; 6,208,990; 6,850,947; 6,895,471; or by the following pending U.S. Patents: 09/644,280;
10/966,046; 10/727,700.
Table of Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2
White Paper
“Best practice” is a term we need to be a careful with. The truth is that what is “best” varies widely
from one situation to another, even for a specific kind of control such as passwords. That’s why
regulations afford the latitude they do for control definition by each company. “Best” is not used
here in a literal way. Rather, it is used to wrap together such notions as “good,” “commonly used,”
“prudent,” “industry standard,” or “generally accepted.” Although there is no official framework for
best practices that you can simply adopt, a variety of information protection controls have come
to be widely accepted as sensible, baseline, and sound practice. In the end, the true authority
for what is right for your company is your company management, your regulatory examiners, and
industry validators.
4 1
Frameworks such as ISO27001, COSO, CoBiT, and ITIL do not provide specific information protection controls or
the effectiveness of controls; they provide a broad range of control objects.
White Paper
Risk Assessment
Any risk is assumable so long as the risk assumption decision is made by the right person(s) and
so long as they are adequately informed.
Risks pose potential consequences that can increase the cost of doing business. The same is
true for controls, which can add obvious costs (such as new processes, IT equipment, or software
licenses) and can also introduce qualitative costs (such as inconvenience to customers or
employees or processing overhead). A control is only cost-justified if the cost of control is less
than the avoided costs of compromise.
No control is perfect, no matter how much you spend; it’s just another balancing act. Strong
controls are usually more costly and almost always much more intrusive into processes and
people’s experiences. Least privilege and need to know are very well-accepted best practice that
is not always easy to implement. If you limit a person’s privileges to the minimum he or she needs
to do his or her job, you will have done what you can to minimize the risks associated with that
person working in your environment. Some companies believe that every employee should be
empowered to serve the customer in any way. This business choice makes limitation of privileges
somewhat moot. People make or break security; no amount of technology can make up for poor
practices and behaviors.
Every technical control ultimately relies on some form of fallible human process: to build it,
configure it, administer it, and use it.
10
White Paper
What good are security and control features in the application if tools are not available to manage
and administer these features properly? Access reports, audit trails, and the like are just as
important as any business functionality in the eyes of examiners and the auditors if nobody else.
12
White Paper
Malicious code, bugs, or poor programming practices can introduce significant risks to your
company in various forms. Select best practices whether you build or buy:
• Adopt and enforce good programming standards
• Adopt and apply a code review using tools and/or independent experts
• Test rigorously and independently with tools and/or independent experts
• Ensure accountability for developers’ work - part of performance criteria
• Build it right once and reuse modular code
Documentation
Let’s be honest, documentation is not free. It takes legwork upfront and maintenance: time, effort,
and an investment.
However, it is undoubtedly a regulatory requirement. The Auditing Standards Board(on which the
Public Company Accounting Oversight Board (PCAOB) and SEC are likely to rely) has said that the
“lack of documentation” is a clear regulatory deficiency in the context of the Sarbanes-Oxley Act.
Whether the controls are effective or not, documentation is required. If not documented, then how
can management assert that they know the state of control versus the intended state?
14
White Paper
16
White Paper
Informatica Offices Around The Globe: Australia • Belgium • Canada • China • France • Germany • Japan • Korea • the Netherlands • Singapore • Switzerland • United Kingdom • USA
© 2009 Informatica Corporation. All rights reserved. Printed in the U.S.A. Informatica, the Informatica logo, and The Data Integration Company are trademarks or registered trademarks of Informatica Corporation in the United States and in
jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners.
6993 (06/26/2009)