Data Security – Scale and Bees
AUG, 2019
by Niall Crawford.
Author Niall Crawford
Niall is the Co-Founder and CIO of Enov8. He has 25 years of experience working across the IT industry from Software Engineering, Architecture, IT & Test Environment Management and Executive Leadership. Niall has worked with, and advised, many global organisations covering verticals like Banking, Defence, Telecom and Information Technology Services.
Data security, The problem is scale & a lack of bees
One of the biggest challenges of securing one’s enterprise data is the sheer volume.
Think about it. Hundred (perhaps Thousands) of Applications, Thousands (perhaps Tens of Thousands) of Instances across Development and Test and within each millions of data point, many of which contain PII (Personally Identifiable Information).
Enov8 Test Data Manager
*aka ‘Data Compliance Suite’
The Data Securitization and Test Data Management platform. DevSecOps your Test Data & Privacy Risks.
Sounds scary huh.
And then, even if you know what to secure (which is a rather “big if”) and independent of what expensive masking tools you have (IBM Optim, Informatica, Compuware, CA etc), there is the task of building the remediation scripts. Which typically take months (8-12 weeks) per platform and is often prone to error and omissions a finally executing them.
A set of tasks that are usually done by a centralized team of data “experts”, with a single TDM tool and delivered in a sequential fashion.
Do the Maths!
The “Small Bank of Narnia” with 100 key platforms would take 16* years to be compliant.
*100 Platforms x 2 months / 12 (months in a year)
Or more likely, simply due to “do-ability” (or lack of “do-ability) the organization will just do half a dozen important ones and hope audit, compliance and/or the regulators don’t notice.
Centralization is Bad
However, the problem is here is not just scale.
The biggest issue is the inability to parallelize (federate) the effort.
Imagine each of the 100 platform teams/tribes could do the masking themselves.
- The skills & method to Understand Data
- The skills & method to accurately remediate the Data
- The technology to execute these exercises in Parallel
Well then one might say, optimistically, that the tasks would go from 16 years to say 6 months.
Our Eureka Moment
These somewhat “obvious” observation lead to our Eureka moment and design of Enov8 TDM (aka Data Compliance Suite).
DCS was designed& built to go “against the grain” of traditional TDM tools and methods and deliver four key things:
- Simplicity of Use
No need for experts. Promoting the opportunity for tribes/ teams to “do it themselves”.
- Hands-Off
Encouraging automation of historically manual (or semi manual) data security tasks
- Parallel Data Ops
Promoting the ability to do Profiling, Masking, Validation in parallel manner.
- Enterprise Visibility
Providing enterprise view of coverage & compliance (opposed to traditional blind-spots).
Our Architecture
Enov8 DCS is a new generation Test Data Management / Data Compliance Solution that was built from the ground up to address the needs of both Technical (engineering) & Non-Technical (audit & compliance) staff alike.
Designed with a pleasant front-end and with “guard-rail like” navigation,
DCS takes the users through a best-practice Data Securitization journey.
Which includes:
- Use of “automated intelligence” to understand your Data & Identify Risks.
- Automatic (on the fly) build of masking or encryption scripts.
Yep no more centralized team taking 8 weeks to engineer “often error-prone” solutions.
- Ease of execution, both Just in time & scheduled.
- Automatically Testing (Validation) Data is Compliant and void of Production PII.
- Delivery of Compliance Dashboards & Reporting showing coverage and status.
Giving Compliance, Security & Audit comfort that IT is moving in the right direction.
And for the more technically minded.
- Use of “Worker Bees” to spread DataOps load across the network
No need to wait for one application to finish masking before you start the next. The Enov8 Worker Bees (Battle Bees) can execute hundreds of Data Operations in parallel. Worker Bees can be placed anywhere on your Network (e.g. across platforms, subnets and clouds) to leverage parallel processing and reduce latency and storage transfer costs.
- Provision of Rest-API & Webhooks so compliance can be added to your delivery-tool chain.
To Summarize
In the “good old days” we all had a single team of “subject matter experts” to mask data. And in a company with a handful of platforms, that would probably still work. However, organizations IT & Test Environments are complicated nowadays. Today even medium sized organizations can have hundreds of data platforms with Gigabytes or Terabytes of data. If your organization want to be “truly” compliant, there is a need to move away from traditionally centralist and serial methods. It is time to automate, federate and parallelize your Data Ops.
Learn more about Enov8 TDM – Datasheets.
Other TDM Reading
Enjoy what you read? Here are a few more TDM articles that you might find interesting.
Enov8 Blog: What s Data Friction from the Perspective of TDM
Enov8 Blog: A DevOps Approach to Test Data Management
Enov8 Blog: What is Data Masking? And how do we do it?
Relevant Articles
Lower vs Upper Environments Explained and Compared
In the dynamic world of software development, where speed, precision, and quality are non-negotiable, the effective management of IT and test environments is the linchpin that determines the success of projects. Environments serve as the critical stages where...
Deployment Strategies: 7 to Consider and How to Choose
It’s common to hear people referring to their deployment strategy as “DevOps,” but that’s not quite accurate. DevOps is a philosophy and culture, while deployment strategies are more narrowly focused on the actual steps used to deploy software. A deployment strategy...
A Detailed Guide to Test Data in Auditing
Test data plays an important role in the world of auditing, yet it is not always well understood. There’s nuance here that’s important to understand. When auditors need to assess whether financial systems, applications, or controls are working as intended,...
Using Production Data for Software Testing
In the world of software development, testing is an essential process that ensures the quality and reliability of a product before it is released to the public. However, traditional testing methods often rely on artificial or simulated data, which can lead to...
Deployment RunBooks (aka Runsheets) Explained in Depth
Deploying software releases can be a challenging and complex process. Even small changes to a software system can have unintended consequences that can cause downtime, user frustration, and lost revenue. This is where deployment runbooks come in. A deployment runbook,...
11 Key Benefits of Application Portfolio Management
In digital‑first organizations, the application landscape is vast and constantly evolving. Departments add tools to meet immediate needs, legacy systems stick around for years, and new technologies emerge faster than they can be evaluated. It’s like finding your...