+ All Categories
Home > Documents > Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc....

Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc....

Date post: 14-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
50
Transcript
Page 1: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 2: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Crucial data privacy and

protection insights for 2019

Richard Macaskill and Kendra Little

Page 3: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Richard [email protected]

20 years Oracle and SQL Server experience

Product Manager

at Redgate

Data Governance

bolshevik!

Page 4: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

@Kendra_Little

[email protected]

Founder of

SQL Workbooks

Evangelist at

Redgate

Microsoft MVP &

Microsoft Certified

Master

Page 5: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Agenda

Page 6: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Compliance is shifting left

Page 7: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

What do we mean by ‘Shift Left’?

Page 8: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Employers are responsible for employees’ actions

Page 9: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Organizations as a whole are responsible

“If a business can’t show that good data protection is

a cornerstone of their practices, they’re leaving

themselves open to a fine or other enforcement action

that could damage bank balance or business

reputation.”

Elizabeth Denham, UK Information Commissioner

Page 10: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Microsoft

Confidential

https://assets.red-gate.com/products/dba/sql-clone/sql-server-database-provisioning-report.pdf

Page 11: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 12: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 13: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 14: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 15: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 16: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

A few words on Static Data Masking

1. Realistic Values – how useful are they?

2. Correlating & syncing values across columns

3. Retaining table integrity post-masking

4. Cross-database & cross-server masking

5. Performance when masking large sets of data

➢ Applications actually work for debug/test

➢ Data rarely exists in isolation

➢ Are there keys that should be masked?

➢ ‘Systems’ use multiple data sources

➢ We can’t block our day’s work

Page 17: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 18: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 19: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 20: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 21: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 22: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 23: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 24: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Perimeter protection is no longer

sufficient

Page 25: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

• 53,000 incidents

• 2,216 confirmed data breaches

• 43,000 successful accesses involving botnets

Page 26: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

Page 27: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

Page 28: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

Page 29: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

DBAs are famous for having

“zero trust” for developers

Page 30: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

Page 31: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

We need

proactive,

general “zero

trust”

Page 32: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

The Future of Data Security: A Zero Trust Approach · John Kindervag,

Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

“There is a fatal flaw in the assumption… that there is

a ‘trusted’ internal network where data is safe”

Page 33: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Key takeaways

Security must become data-centric

A security and control framework should define, analyze, and protect the data

Data breaches dangerously erode consumer trust

The Future of Data Security: A Zero Trust Approach · John Kindervag,

Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

Page 34: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Limit access Classify data

Dispose of data when no longer needed

Devalue or “kill” data using abstraction techniques

The Future of Data Security: A Zero Trust Approach · John Kindervag,

Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

Page 35: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

KEPRO: Ensuring HIPAA compliance with SQL Provision ·

Redgate · http://bit.ly/2RtUCoB

“SQL Provision has given us the ability to mask data

and push it out to multiple locations almost instantly.

That saves hours compared to the way we used to

refresh.”

Page 36: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

You risk overspending when you

implement security controls

Page 37: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Executives havetraditionally under-estimated risk

relative to tech professionals

Page 38: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

But that’s changing

Source: Redgate-commissioned survey, 378 respondents in mid-large enterprises, senior roles

Page 39: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

But that’s changing

Source: https://uk.pcmag.com/feature/118088/gartners-cio-agenda-and-ceo-perspective-for-2019

Page 40: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Or misconstrued

its nature

Page 41: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

2018 Data Breach Investigations Report · Verizon ·

https://enterprise.verizon.com/resources/reports/dbir/

Page 42: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Alignment protects

against over-spend

Page 43: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 44: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 45: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 46: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal
Page 47: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Discussion: chat on YouTube,

Slack, or Twitter #sqlinthecity

Page 48: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Crucial DPP insights for 2019

1. Compliance is shifting left

2. Perimeter protection is no longer sufficient, adopt a

“Zero Trust” mindset for your data

3. Alignment of developers, ops, and IT Managers

protects against over spending when implementing

security controls

Page 49: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

Next steps

Download the Data

Privacy Influencer PDF

red-gate.com/sitc

Contact

[email protected]

Page 50: Crucial data privacy and - Redgate · Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc. “There is a fatal flaw in the assumption… that there is a ‘trusted’ internal

References & Resources

2018 Data Breach Investigations Report · Verizon · https://enterprise.verizon.com/resources/reports/dbir/

KEPRO: Ensuring HIPAA compliance with SQL Provision · Redgate · http://bit.ly/2RtUCoB

SQL Provision adds fully integrated data masking · Redgate · https://www.red-gate.com/hub/product-learning/sql-provision/sql-provision-adds-fully-integrated-data-masking

The Future of Data Security: A Zero Trust Approach · John Kindervag, Heidi Shey, Kelley Mak, 2014 · Forrester Research, Inc.

Zero Trust: Your Knight In Cyber Armor · Forrester Research, Inc. · https://go.forrester.com/what-it-means/ep93-zero-trust-cyber-armor/


Recommended