This chapter explains the basics of Oracle Data Masking and Subsetting pack by providing an overview on:
It is recommended that you understand the above concepts of Oracle Data Masking and Subsetting prior to the implementation. If you are already aware of these concepts or want to start masking and subsetting data, please refer to the outline of steps to mask and subset data mentioned below in this chapter.
For Oracle Data Masking and Subsetting licensing information, please refer to Oracle Database Licensing Guide.
1.1 The Need to Mask and Subset Data
The reasons to mask and subset data include the following:
Limit sensitive data proliferation: The growing security threats have increased the need to limit exposure of sensitive information. At the same time, copying production data for non-production purposes such as test and development is proliferating sensitive data, expanding the security and compliance boundary, and increasing the likelihood of data breaches.
Share what is necessary: Often, companies have to share a production data set with internal and external parties for various reasons. For example, a Cloud application provider may have to extract and share information specific to their individual subscribers on demand. Another example is a company serving a court order must extract and share a subset of production data with the court. In several cases, it is efficient to extract and share a portion or subset of information instead of sharing the entire production dataset.
Comply with data privacy laws and standards: Data privacy standards such as PCI-DSS and European Union (EU) General Data Protection Regulation (GDPR) emphasize on protecting sensitive information in non-production environments because these environments are typically not as protected or monitored as production systems. EU GDPR also mandates an individual’s right to be forgotten, erasure, portability or rectification which requires identifying and processing a subset of information.
Minimize storage costs: Using the entire production data for test, development, and QA purposes will incur additional storage costs and prolong the test and development cycles, increasing the overall storage and operational cost.
Masking and subsetting data addresses the above use cases. Data Masking is the process of replacing sensitive data with fictitious yet realistic looking data. Data Subsetting is the process of downsizing either by discarding or extracting data. Masking limits sensitive data proliferation by anonymizing sensitive production data. Subsetting helps to minimize storage costs by deleting data or extracting a subset of data for sharing or archival. Data Masking is also known as Static Data Masking, and Data Subsetting is also known as Test Data Management.
1.2 Challenges Organization Face for Masking and Subsetting Data
Organizations typically mask and subset data using custom scripts or solutions. While these in-house solutions might work for few columns, they may not cater to large applications with distributed databases and thousands of columns, and result in challenges such as:
How to locate sensitive data in the midst of numerous applications, databases, and environments?
How to accurately protect sensitive data as data has different shapes and forms such as VISA, AMEX, Discoverer, Master, Social Security Numbers, and more?
Is the protected data usable to developers, testers, and applications?
Will the applications continue to work after masking and subsetting is done?
In addition to the above challenges, organizations may not have the resources to develop and maintain such a solution in this ever-changing IT landscape.
1.3 How Oracle Data Masking and Subsetting Addresses Masking/Subsetting Challenge
Oracle Data Masking and Subsetting addresses the above challenges by providing an automated, flexible, and easy-to-use solution that masks and subsets sensitive production data, thereby allowing data to be shared safely across non-production environments.
The Oracle Data Masking and Subsetting (DMS) pack of the Oracle Enterprise Manager (EM) helps:
maximize the business value of data by masking sensitive information
minimize the compliance boundary by not proliferating the sensitive production information
lower the storage costs on test and development environments by subsetting data
automate the discovery of sensitive data and parent-child relationships
provide a comprehensive library of masking formats, masking transformations, subsetting techniques, and select application templates
mask and subset data in-Database or on-the-file by extracting the data from a source database
mask and subset both Oracle and non-Oracle databases
mask and subset Oracle Databases hosted on the Oracle cloud
preserve data integrity during masking and subsetting and offers many more unique features
integrate with select Oracle testing, security, and integration products.
Figure 1-1 Oracle Data Masking and Subsetting Used in a Production and Test Database Setup
Description of "Figure 1-1 Oracle Data Masking and Subsetting Used in a Production and Test Database Setup"
1.4 Major Components of Oracle Data Masking and Subsetting
Oracle Data Masking and Subsetting consists of the following major components.
1.4.1 Application Data Modeling
The Application Data Modeling module of the Oracle Data Masking and Subsetting pack simplifies the effort of sensitive data discovery through automated discovery procedures and sensitive column types. These procedures not only discover columns holding sensitive information, but also discover the parent-child relationships between these columns that are defined in the database.
A sensitive column type creates forensics of sensitive data elements, such as national insurance numbers, using a combination of data patterns in column names, column data, and columns comments. Automated discovery procedures leverage sensitive column types to sample data in the database table columns while scanning the database for sensitive information.
Application Data Modeling provides several out-of-the-box sensitive columns types such as credit card numbers, social security numbers, phone numbers. Customer-sensitive column types can be easily created using regular expressions.
Figure 1-2 Editing an Application Data Model
Description of "Figure 1-2 Editing an Application Data Model"
1.4.2 Data Masking Format Library
While Application Data Modeling automates the task of sensitive data discovery and modeling, a comprehensive library of masking formats and transformations simplify the effort of defining a masking criteria on the sensitive columns that are discovered.
One of the key aspects of the data masking exercise is to replace the sensitive information with fake data, without breaking the semantics and structure of the data element. The masked data must be realistic and pass format-specific checks such as Luhn check. For example, a masked credit card number must not only be a valid credit card number, but also a valid VISA, Master, American Express or Discover card number. Failing to maintain this data integrity will affect the development or test processes and may break the corresponding application.
Oracle Data Masking and Subsetting is packed with a comprehensive library of masking formats that covers most of the Personally Identifiable Information (PII) and Payment Card Information (PCI). Different types of credit card numbers or national identifiers of different countries or bank account numbers, the masking format library will meet the enterprise needs.
In addition to the several out-of-the-box masking formats, the product provides various built-in tools to easily create custom-masking formats. There are simple tools that generate fixed or random numbers, strings, and dates. There are tools that facilitate substitution from lookup tables. There are tools such as SQL Expression and User Defined Function to accommodate complex user-defined masking logic.
Figure 1-3 Data Masking Format Library
Description of "Figure 1-3 Data Masking Format Library"
1.4.3 Data Masking Transformations
Data Masking format library and application templates accelerate the task of defining masking rules and preserving the integrity and structure of data elements.
Depending on the business use cases, organizations may have different requirements while mapping masking formats to sensitive columns. For example, one of the requirements in a large distributed database environment is to generate consistent masked outputs for the given input across multiple databases. Oracle Data Masking and Subsetting provides sophisticated masking transformations that fit into broader business context. If masking formats are considered as building blocks of a data masking definition, then masking transformations align these masking formats according to the different business requirements.
Conditional transformation provides an ability to arrange masking formats according to different conditions. For example, consider masking a column containing unique person identifiers. Identifiers that belong to country USA can be masked using Social Security Number format and that belong to country UK can be masked using National Insurance Number format.
Compound transformation (also known as grouping option), masks related columns as a group, ensuring the masked data across the related columns retain the same relationship. For example, consider masking address fields such as city, state, and postal codes. These values must be consistent after masking.
Deterministic transformation generates consistent outputs for a given input across databases. This transformation will be helpful to maintain data integrity across multiples applications and preserve system integrity in a single sign-on environment. For example, consider three applications: a human capital management application, a customer relationship management application, and a sales data warehouse. These three applications may have key common fields such as EMPLOYEE ID that must be masked consistently across these applications. Substitute and Encrypt masking formats provide deterministic masking transformation.
Shuffle transformation shuffles fields within a column in a random fashion. This transformation is helpful in breaking one-to-one mapping between sensitive data elements. For example, columns containing personal health records can be shuffled while masking health care information.
Key Based Reversible Masking (Encrypt Format)
This transformation encrypts and decrypts the original data using a secure key string. The input data format is preserved during encryption and decryption. This transformation uses powerful industry-standard 3DES algorithm. This transformation is helpful when businesses need to mask and send their data to a third-party for analysis, reporting, or any other business processing purpose. After the processed data is received from the third-party, the original data can be recovered using the same key string that was used to encrypt the data.
Format Preserving Randomization (Auto Mask Format)
This transformation randomizes the data, preserving the input length, position of the characters and numbers, case of the character (upper or lower), and special characters in the input.
1.4.4 Data Subsetting
Subsetting modern enterprise class applications is a challenging task. Oracle Data Masking and Subsetting simplifies this effort through its easy-to-define goal and condition-based subsetting techniques. Data can be subsetted based on different goals. A goal can be relative table size, for example, extracting 1% subset of a table containing 1 million rows. Data can also be subsetted based on different conditions. A condition can be based on time, for example, discarding all user records created prior to a particular year. A condition can be based on region, for example, extracting Asia Pacific information for a new application development. The conditions are specified using “SQL where clause”. The “SQL where clause” also supports bind variables.
Figure 1-4 Subsetting based on a condition
Description of "Figure 1-4 Subsetting based on a condition"
Data Subsetting generates a real-time dynamic view of the application schema with before and after storage size and the percentage of data within the tables being subsetted, including the dependent tables. Administrators can use this view to validate the subsetting criteria even before subsetting the data.
1.4.5 Integrated Masking and Subsetting
Oracle Data Masking and Subsetting provides quick masking and detailed masking options in-line to subsetting data. Quick masking can be used in cases where the primary use case is data subsetting with a requirement to mask few sensitive columns. Quick masking provides minimal masking formats such as fixed number or fixed string to replace all the sensitive fields to a common masked value. If the requirement is to mask several sensitive columns with different formats and preserving the integrity of the masked data, use the data masking component to create detailed masking definitions. These pre-created detailed masking definitions can be called in-line with the data subsetting definitions. During execution, data is subsetted followed by data being masked.
Data Subsetting integrated with Data Masking maximizes the business value of the production data without compromising sensitive information.
Oracle Data Masking and Subsetting is part of the Oracle Enterprise Manager infrastructure. Organizations using Oracle Enterprise Manager do not need to download and install the Oracle Data Masking and Subsetting Pack separately. Oracle Enterprise Manager provides unified browser-based user interface for administration. All Data Masking and Subsetting objects are centrally located in the Oracle Enterprise Manager repository, which facilitates centralized creation and administration of Application Data Models, Data Masking and Subsetting rules or definitions. In addition to its intuitive cloud control Graphical User Interface (GUI), Oracle Enterprise Manager also provides Command Line Interface (EMCLI) to automate select Data Masking and Subsetting tasks.
Figure 1-5 Architecture of the Oracle Data Masking and Subsetting
Description of "Figure 1-5 Architecture of the Oracle Data Masking and Subsetting "
For more details on Oracle Enterprise Manager Architecture, please refer to the Oracle Enterprise Manager Introduction Guide.
1.6 Deployment Options
Oracle Data Masking and Subsetting provides the following modes for masking and subsetting data:
In-Database mode directly masks and subsets data within a non-production database with minimal or zero impact on production environments. As In-Database mode permanently changes the data in a database, it is recommended for non-production environments such as staging, test or development databases instead of production databases.
In-Export mode masks and subsets the data in near real-time while extracting the data from a database. The masked and subsetted data that is extracted is written to data pump export files, which can be further imported into test, development or QA databases. In general, In-Export mode is used for production databases. In-Export method of masking and subsetting is a unique offering from Oracle that sanitizes sensitive information within the product perimeter.
Heterogeneous mode Oracle Data Masking and Subsetting can mask and subset data in non-Oracle databases. Target production data is first copied from the non-Oracle environment into Oracle Database using an Oracle Database Gateway, and is then masked and subsetted within the Oracle Database, and is finally copied back to the non-Oracle environment. This approach is very similar to the steps used in various ETL (Extract, Transform, and Load) tools, except that the Oracle Database is the intermediary that transforms the data. Oracle Database Gateways enable Oracle Data Masking and Subsetting to operate on data from Oracle MySQL, Microsoft SQLServer, Sybase SQLServer, IBM DB2 (UDB, 400, z/OS), IBM Informix, and Teradata.
In order to mask and subset non-Oracle databases, you must have a license for Oracle Data Masking and Subsetting for non-Oracle Databases. For more information on licensing, please refer to Oracle Database Licensing Guide .
Oracle Data Masking and Subsetting uses the following methodology to secure non-production database and replace sensitive data with fictitious, but relevant data that meets compliance requirements.
Creating an Application Data Model— Discover sensitive data and data relationships, and then create or assign an Application Data Model
Selecting Masking Formats and Criteria— Create data masking definition and masking format types and templates based on the sensitive data that is discovered
Previewing and Validating — Secure sensitive data by previewing the masking algorithm results and the subset reduction results
Executing Masking Transformations— Execute In-Database or In-Export masking and subsetting transformations and validate the data that is masked
The following figure describes the methodology used in Oracle Data Masking and Subsetting.
Figure 1-6 Methodology
Description of "Figure 1-6 Methodology"
1.8 Outline of Steps to Mask and Subset Data
This section outlines the steps to mask and subset data in the context of the rest of this document.
Start with the Before You Begin chapter to understand the privileges, roles, and storage requirements.
Refer to the Application Data Modeling chapter to discover and model sensitive columns.
Refer to the Data Masking chapter to define and execute masking criteria .
Refer to the Data Subsetting chapter to define and execute subsetting criteria.