Bridging the educational divide–How business networks level the playing field for those most in need

Bridging the educational divide–How business networks level the playing field for those most in need

The next BriefingsDirect panel discussion explores how Step Up For Students (SUFS), a non-profit organization in Florida, has collaborated with SAP Ariba to launch MyScholarShop, a digital marketplace for education that bridges the information gap and levels the playing field for those students most in
How the Cloud Has Changed the Construction Industry

How the Cloud Has Changed the Construction Industry

Cloud Construction Industry Cloud and remote computing have transformed the modern world in many ways. One may not expect so, but the technology has even taken hold in completely unrelated industries — construction and development is a great example. Why It’s so Helpful What makes
Jagadeesh G

How to secure personally identifiable information (PII) of customers

Secure Personally Identifiable Information

Information security has been a constant challenge for enterprises. Especially in a software test environment, enterprises face the threat of exposing the personally identifiable information (PII) of customers and commercially sensitive data (financial, operational, and strategic) to the test teams (external vendors).

Test data management (TDM) is one of the effective ways to tauten data security. It helps businesses to improve the security of sensitive information and prevent their exposure to the test environment. Some of the many features offered by TDM tools are:

  • Data profiling
  • Data sub-setting
  • Data masking
  • Synthetic test data creation
  • Test data repository

These functionalities not only improve information security but also provide features such as on-demand test data and reusability of test data. A typical TDM implementation will include source data, TDM tool, and test environment. The standard source data is connected to a TDM tool to provide maximum security and filter out sensitive data before it is exposed to the test environment.

Challenges of Test data management (TDM) Tools

Although TDM is an effective method to manage data security, there are still certain issues that need to be addressed to enhance data security and process agility. Some of them are:

  • Integration with source system: A lot of source systems do not use any industry standard databases (DBs) like Oracle, SQL etc. Accessing such No-SQL DBs and understanding the table structure, relationship etc. is a challenge for the TDM tool. (For e.g. Salesforce has NoSQL DB and TDM tools face integration challenges with Salesforce).

  • Sensitive data exposure: TDMs provide data security to a certain level. However, sensitive data (Customer PII information, financial information, strategic moves etc.) is still exposed to the TDM users/teams.

  • Delays in test data creation: TDM can create synthetic data rather quickly. However, extracting huge data from production and processing it is often time consuming.

Adding a data security layer to enhance security and efficiency in TDM

In order to overcome the challenges discussed above, it is recommended to add a data security layer on top of the TDM tool. This data security layer should be custom built with data security & integration agent and automated data loader to enhance the security and performance.

Data security and integration agent

One of the effective ways to enhance the security and ease the integration challenges is to introduce an agent between the source and TDM tools. This agent provides quicker integration APIs to integrate a TDM system with any of the source systems, irrespective of the database management systems.

Data security and integration agent analyzes the source database schema, tables, and relationships and create tables, triggers, and sequences in accordance with the TDM tool’s DB structure.

These agents not only solve integration issues but also provide an additional layer of security through automated data-masking scripts that minimize data exposure.

Data security and integration agent should be capable of extracting only relevant and minimum possible data (tables and relationship) from the source thus enabling faster processing. Agents also provide configurations for sensitive data/personally identifiable information (PII), data access and masking policies.

Automated data loader

Automated scripts play a crucial role in enhancing data security and expediting the extraction process. Automated scripts securely extract the data such as a table, relationship, and schema information from the source system without manual intervention and load these data from source to TDM and further from TDM to test environment in a secured (password-protected) and effective way. This helps avoid exposing sensitive personally identifiable information (PII) to test teams.

Secure Personally Identifiable Information 

Benefits of data security layer on TDM:

  • PII compliance, as no production data is exposed to testing or TDM environment
  • Increase in productivity through agent-based slicing
  • Faster data extraction through automated data loading scripts
  • Faster data masking through an agent and automated scripts
  • Customized test data management can help enterprises secure their data in a test environment and generate test data covering all the scenarios in less time
  • Test data repository enables enterprises to access test data on demand

By Jagadeesh G, Technical Lead, Prodapt

Jagadeesh has 12+ years of automation testing and test lifecycle management experience in integrating complex technologies such as Salesforce Cloud, Netezza DWH and Hadoop big data for test data management. 

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

TOP ARCHIVES

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
5 Data Security Tips Small Businesses Should Mimic

5 Data Security Tips Small Businesses Should Mimic

Data Security Tips As more and more companies begin to switch to the cloud, cyber attacks need to be a ...
What makes ‘Cloud’ a dependable solution for the independent field workforce?

What makes ‘Cloud’ a dependable solution for the independent field workforce?

5 Major Reasons to Switch from Paper to Digital! The web of wireless networks has connected the entire world. It’s ...
Key Cloud Office Trends Of The Future

Key Cloud Office Trends Of The Future

Cloud Office Trends The mass migration to the cloud is well under way and will only accelerate. Two giants continue ...
Understanding Data Governance - Don't Be Intimidated By It

Understanding Data Governance – Don’t Be Intimidated By It

Understanding Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...