Cover image for The Complete book of data anonymization : from planning to implementation
Title:
The Complete book of data anonymization : from planning to implementation
Personal Author:
Physical Description:
xxi, 247 pages: illustrations; 24 cm.
ISBN:
9781439877302

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010343225 QA76.9.A25 R348 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and governance, it illustrates the entire process of adapting and implementing anonymization tools and programs.

Part I of the book begins by explaining what data anonymization is. It describes how to scope a data anonymization program as well as the challenges involved when planning for this initiative at an enterprisewide level.

Part II describes the different solution patterns and techniques available for data anonymization. It explains how to select a pattern and technique and provides a phased approach towards data anonymization for an application.

A cutting-edge guide to data anonymization implementation, this book delves far beyond data anonymization techniques to supply you with the wide-ranging perspective required to ensure comprehensive protection against misuse of data.


Author Notes

Balaji Raghunathan has more than 20 years of experience in the software industry. As part of his current role as General Manager, Technology Consulting & Enterprise Architecture, at ITC Infotech, Balaji Raghunathan is responsible for helping the clients of ITC Infotech simplify their technology landscape, assess their readiness for digital initiatives, modernize their technology architecture and prepare them for their digital journey

Balaji Raghunathan has also lead the delivery of digital projects for banking, financial services, and insurance customers as well as helped them define their digital strategy. He has lead strategy engagements for enterprise mobility initiatives as well as developed, managed and commercialized intellectual property (IP) during his prior stints with Capgemini and Infosys. During the last decade, Balaji Raghunathan has been involved in architecting software solutions for the energy, utilities, publishing, transportation, retail, and banking industries

Balaji Raghunathan's core areas of interest revolves around digital technology strategy, data privacy management and enterprise mobility. He is an avid blogger on Digital Technology Strategy, and has authored the book "The Complete Book of Data Anonymization-From Planning to Implementation". He has also the co-authored a chapter "Mobility and Its Impact on Enterprise Security" for the book "Information Security Management Handbook, Sixth Edition, Volume 7."

He holds a patent on "System and Method for Runtime Data Anonymization" and has a pending patent on "System and Method for categorization of Social Media Conversation for Response Management."

He is a TOGAF 8.0 and ICMG-WWISA Certified Software Architect.

Balaji Raghunathan has a postgraduate diploma in business administration (finance) from Symbiosis Institute (SCDL), Pune, India and has an engineering degree (electrical and electronics) from Bangalore University, India. He has also completed a Senior Leadership Certificate course from Indian Institute of Management, Kozhikode.


Table of Contents

Introductionp. xiii
Acknowledgmentsp. xv
About the Authorp. xix
Chapter 1 Overview of Data Anonymizationp. 1
Points to Ponderp. 1
PIIp. 2
PHIp. 4
What Is Data Anonymization?p. 4
What Are the Drivers for Data Anonymization?p. 5
The Need to Protect Sensitive Data Handled as Part of Businessp. 5
Increasing Instances of Insider Data Leakage, Misuse of Personal Data, and the Lure of Money for Mischievous Insidersp. 6
Astronomical Cost to the Business Due to Misuse of Personal Datap. 7
Risks Arising out of Operational Factors Such as Outsourcing and Partner Collaborationp. 8
Legal and Compliance Requirementsp. 8
Will Procuring and Implementing a Data Anonymization Tool by Itself Ensure Protection of Privacy of Sensitive Data?p. 9
Ambiguity of Operational Aspectsp. 10
Allowing the Same Users to Access Both Masked and Unmasked Environmentsp. 10
Lack of Buy-In from IT Application Developers, Testers, and End-Usersp. 10
Compartmentalized Approach to Data Anonymizationp. 11
Absence of Data Privacy Protection Policies or Weak Enforcement of Data Privacy Policiesp. 11
Benefits of Data Anonymization Implementationp. 11
Conclusionp. 12
Referencesp. 12
Part I Data Anonymization Program Sponsor's Guidebook
Chapter 2 Enterprise Data Privacy Governance Modelp. 19
Points to Ponderp. 19
Chief Privacy Officerp. 20
Unit/Department Privacy Compliance Officersp. 22
The Steering Committee for Data Privacy Protection Initiativesp. 22
Management Representativesp. 23
Information Security and Risk Department Representativesp. 23
Representatives from the Departmental Security and Privacy Compliance Officersp. 24
Incident Response Teamp. 24
The Role of the Employee in Privacy Protectionp. 25
The Role of the CIOp. 26
Typical Ways Enterprises Enforce Privacy Policiesp. 26
Conclusionp. 26
Chapter 3 Enterprise Data Classification Policy and Privacy Lawsp. 29
Points to Ponderp. 29
Regulatory Compliancep. 30
Enterprise Data Classificationp. 34
Points to Considerp. 36
Controls for Each Class of Enterprise Datap. 36
Conclusionp. 37
Chapter 4 Operational Processes, Guidelines, and Controls for Enterprise Data Privacy Protectionp. 39
Points to Ponderp. 39
Privacy Incident Managementp. 43
Planning for Incident Resolutionp. 44
Preparationp. 45
Incident Capturep. 46
Incident Responsep. 47
Post Incident Analysisp. 47
Guidelines and Best Practicesp. 48
PII/PHI Collection Guidelinesp. 48
Guidelines for Storage and Transmission of PII/PHIp. 49
PII/PHI Usage Guidelinesp. 49
Guidelines for Storing PII/PHI on Portable Devices and Storage Devicesp. 50
Guidelines for Staffp. 50
Conclusionp. 50
Referencesp. 51
Chapter 5 The Different Phases of a Data Anonymization Programp. 53
Points to Ponderp. 53
How Should I Go about the Enterprise Data Anonymization Program?p. 53
The Assessment Phasep. 54
Tool Evaluation and Solution Definition Phasep. 56
Data Anonymization Implementation Phasep. 56
Operations Phase or the Steady-State Phasep. 57
Food for Thoughtp. 58
When Should the Organization Invest in a Data Anonymization Exercise?p. 58
The Organization's Security Policies Mandate Authorization to Be Built into Every Application. Won't this Be Sufficient? Why is Data Anonymization Needed?p. 58
Is There a Business Case for a Data Anonymization Program in My Organization?p. 59
When Can a Data Anonymization Program Be Called a Successful One?p. 60
Why Should I Go for a Data Anonymization Tool When SQL Encryption Scripts Can Be Used to Anonymize Data?p. 61
Challenges with Using the SQL Encryption Scripts Approach for Data Anonymizationp. 61
What Are the Benefits Provided by Data Masking Tools for Data Anonymization?p. 62
Why Is a Tool Evaluation Phase Needed?p. 62
Who Should Implement Data Anonymization? Should It Be the Tool Vendor, the IT Service Partner, External Consultants, or Internal Employees?p. 63
How Many Rounds of Testing Must Be Planned to Certify That Application Behavior Is Unchanged with Use of Anonymized Data?p. 64
Conclusionp. 64
Referencep. 65
Chapter 6 Departments Involved in Enterprise Data Anonymization Programp. 67
Points to Ponderp. 67
The Role of the Information Security and Risk Departmentp. 67
The Role of the Legal Departmentp. 68
The Role of Application Owners and Business Analystsp. 70
The Role of Administratorsp. 70
The Role of the Project Management Office (PMO)p. 71
The Role of the Finance Departmentp. 71
Steering Committeep. 71
Conclusionp. 72
Chapter 7 Privacy Meter-Assessing the Maturity of Data Privacy Protection Practices in the Organizationp. 75
Points to Ponderp. 75
Planning a Data Anonymization Implementationp. 78
Conclusionp. 79
Chapter 8 Enterprise Data Anonymization Execution Modelp. 83
Points to Ponderp. 83
Decentralized Modelp. 84
Centralized Anonymization Setupp. 85
Shared Services Modelp. 86
Conclusionp. 87
Chapter 9 Tools and Technologyp. 89
Points to Ponderp. 89
Shortlisting Tools for Evaluationp. 91
Tool Evaluation and Selectionp. 92
Functional Capabilitiesp. 92
Technical Capabilitiesp. 96
Operational Capabilitiesp. 99
Financial Parametersp. 99
Scoring Criteria for Evaluationp. 101
Conclusionp. 101
Chapter 10 Anonymization Implementation-Activities and Effortp. 103
Points to Ponderp. 103
Anonymization Implementation Activities for an Applicationp. 104
Application Anonymization Analysis and Designp. 104
Anonymization Environment Setupp. 105
Application Anonymization Configuration and Buildp. 105
Anonymized Application Testingp. 105
Complexity Criteriap. 105
Application Characteristicsp. 106
Environment Dependenciesp. 106
Arriving at an Effort Estimation Modelp. 107
Case Studyp. 108
Contextp. 108
Estimation Approachp. 109
Application Characteristics for LOANADMp. 110
Arriving at a Ball Park Estimatep. 110
Conclusionp. 111
Chapter 11 The Next Wave of Data Privacy Challengesp. 113
Part II Data Anonymization Practitioner's Guide
Chapter 12 Data Anonymization Patternsp. 119
Points to Ponderp. 119
Pattern Overviewp. 119
Conclusionp. 121
Chapter 13 Data State Anonymization Patternsp. 123
Points to Ponderp. 123
Principles of Anonymizationp. 123
Static Masking Patternsp. 124
EAL Pattern (Extract-Anonymize-Load Pattern)p. 125
ELA Pattern (Extract-Load-Anonymize Pattern)p. 125
Data Subsettingp. 126
Dynamic Maskingp. 128
Dynamic Masking Patternsp. 128
Interception Patternp. 129
When Should Interception Patterns be Selected and on What Basis?p. 130
Challenges Faced When Implementing Dynamic Masking Leveraging Interception Patternsp. 132
Invocation Patternp. 132
Application of Dynamic Masking Patternsp. 133
Dynamic Masking versus Static Maskingp. 133
Conclusionp. 134
Chapter 14 Anonymization Environment Patternsp. 137
Points to Ponderp. 137
Application Environments in an Enterprisep. 137
Testing Environmentsp. 139
Standalone Environmentp. 140
Integration Environmentp. 141
Automated Integration Test Environmentp. 144
Scaled-Down Integration Test Environmentp. 148
Conclusionp. 150
Chapter 15 Data Flow Patterns Across Environmentsp. 153
Points to Ponderp. 153
Flow of Data from Production Environment Databases to Nonproduction Environment Databasesp. 153
Controls Followedp. 155
Movement of Anonymized Files from Production Environment to Nonproduction Environmentsp. 155
Controlsp. 157
Masked Environment for Integration Testing-Case Studyp. 157
Objectives of the Anonymization Solutionp. 158
Key Anonymization Solution Principlesp. 158
Solution Implementationp. 159
Anonymization Environment Designp. 160
Anonymization Solutionp. 161
Anonymization Solution for the Regression Test/Functional Testing Environmentp. 163
Anonymization Solution for an Integration Testing Environmentp. 163
Anonymization Solution for UAT Environmentp. 164
Anonymization Solution for Preproduction Environmentp. 164
Anonymization Solution for Performance Test Environmentp. 165
Anonymization Solution for Training Environmentp. 166
Reusing the Anonymization Infrastructure across the Various Environmentsp. 166
Conclusionp. 169
Anonymization Environment Designp. 169
Chapter 16 Data Anonymization Techniquesp. 171
Points to Ponderp. 171
Basic Anonymization Techniquesp. 172
Substitutionp. 172
Shufflingp. 174
Number Variancep. 176
Date Variancep. 177
Character Maskingp. 181
Cryptographic Techniquesp. 182
Partial Sensitivity and Partial Maskingp. 185
Masking Based on External Dependancyp. 185
Auxiliary Anonymization Techniquesp. 186
Alternate Classification of Data Anonymization Techniquesp. 189
Leveraging Data Anonymization Techniquesp. 190
Case Studyp. 191
Input File Structurep. 191
AppTable Structurep. 191
Output File Structurep. 194
Solutionp. 194
Conclusionp. 195
Data Anonymization Mandatory and Optional Principlesp. 196
Referencep. 196
Chapter 17 Data Anonymization Implementationp. 197
Points to Ponderp. 197
Prerequisites before Starting Anonymization Implementation Activitiesp. 199
Sensitivity Definition Readiness-What Is Considered Sensitive Data by the Organization?p. 199
Sensitive Data Discovery-Where Do Sensitive Data Exist?p. 200
Application Architecture Analysisp. 200
Application Sensitivity Analysisp. 202
What Is the Sensitivity Level and How Do We Prioritize Sensitive Fields for Treatment?p. 203
Case Studyp. 204
Anonymization Design Phasep. 208
Choosing an Anomymization Technique for Anonymization of Each Sensitive Fieldp. 208
Choosing a Pattern for Anonymizationp. 209
Anonymization Implementation, Testing, and Rollout Phasep. 211
Anonymization Controlsp. 212
Anonymization Operationsp. 213
Incorporation of Privacy Protection Procedures as Part of Software Development Life Cycle and Application Life Cycle for New Applicationsp. 214
Impact on SDLC Teamp. 216
Challenges Faced as Part of Any Data Anonymization Implementationp. 216
General Challengesp. 216
Functional, Technical, and Process Challengesp. 217
People Challengesp. 219
Best Practices to Ensure Success of Anonymization Projectsp. 220
Creation of an Enterprise-Sensitive Data Repositoryp. 220
Engaging Multiple Stakeholders Earlyp. 220
Incorporating Privacy Protection Practices into SDLC and Application Life Cyclep. 220
Conclusionp. 221
Referencesp. 221
Appendix A Glossaryp. 223
Indexp. 229