{"id":246,"date":"2015-01-13T11:19:55","date_gmt":"2015-01-13T11:19:55","guid":{"rendered":"http:\/\/www.gallop.net\/blog\/?p=246"},"modified":"2022-07-19T18:50:05","modified_gmt":"2022-07-19T13:20:05","slug":"securing-on-premise-data-through-data-masking-2","status":"publish","type":"post","link":"https:\/\/www.cigniti.com\/blog\/securing-on-premise-data-through-data-masking-2\/","title":{"rendered":"Securing on-premise data through data masking"},"content":{"rendered":"
Cloud computing<\/strong> has been growing in popularity over the years due to the several benefits it offers like higher scalability, flexibility and less infrastructure costs. At the same time, security has always been a prime concern, particularly in applications handling sensitive personal and commercial data. A study of 2200 companies reveals that 48%<\/a> of respondents with on-premise datacenters suffered data attacks.<\/p>\n Cloud provides a highly scalable and convenient development and testing interface. So, how can companies make data available to their employees for development, testing or analysis purposes without running the risk of a data breach?<\/p>\n Data Masking<\/strong> or data obfuscation provides an efficient way of addressing security concerns with storing data in the cloud. It involves replacing sensitive data with fake but realistic data prior to moving to the cloud.<\/p>\n Multiple data masking techniques are used to ensure the data is kept secure. Notable among them are:<\/p>\n This is the process of masking production data at the point when the data request is actually made. There are two types of dynamic masking \u2013 view based masking and proxy based masking.<\/p>\n View based masking<\/strong> maintains the production version and the masked version of the data in the same database. Users who are not approved to view production data or who trigger the security filter in any way are shown masked data. The decision to show masked or production data is made in real-time based on pre-programmed rules.<\/p>\n Proxy-based masking<\/strong> introduces a proxy layer between the user and the database. The user query passes through the proxy which substitutes the result of the query with masked values. This provides data protection without the need to alter the database.<\/p>\n Another recent technique is query substitution<\/strong> which intercepts and redirects the query to retrieve data from masked columns. Such queries are very flexible and can pick masked data from a view or file or even link to another database.<\/p>\n Though Cloud infrastructure has also been exposed to security threats in recent times, but organizations cannot afford to shy away from the cloud due such security threats due the benefits they offer. Data masking is one of the techniques which is making Cloud more secure. Experts expect the data masking market to grow 30-40%<\/a> a year as organizations become increasingly cautious of security breaches from inside as much as from outside. Data masking provides an effective way to leverage the benefits of the cloud without compromising on security.<\/p>\n Enterprises face a relentless onslaught of security challenges ranging from DDoS attacks, Database compromise, unauthorized entry, breach of access control, login flaws and vulnerabilities across sessions, multiple authentications, caches etc. Want to provide greater security for your enterprise data? Download our Security Testing white paper to know more<\/a>.<\/p>\n We are also hosting a Webinar on Mobile Application Security Testing Right before your eyes on Jan 22nd<\/sup>, 2015 at 11 AM EST. <\/strong>Register for the webinar to get deeper insights into how to do efficient security testing \u2013 Register for Security Testing Webinar here<\/strong>.<\/a><\/p>\nAdvantages of Data masking:<\/span><\/h4>\n
\n
Masking techniques<\/span><\/h4>\n
\n
What is dynamic masking?<\/span><\/h4>\n