Verifying Compliance

 

Next Steps
Overview Auditing CCPA DLP FERPA GDPR HIPAA PCI DSS DMaaS Static Dynamic

Challenges


More data privacy laws -- like those tabbed across this section -- in the US, Europe, and other international jurisdictions are passing and being enforced. CISOsand data governance teams responsible for safeguarding data at risk must also prove they located and protected that data in the right places, and in the right ways.

Data Loss Prevention (DLP) systems and data masking software can discover and de-identifyPersonally Identifiable Information (PII). How well do they document their search results, and actual masking procedures? How easy is it to locate and modify specific protections if something needs to be redone, or done differently? How can the risk of re-identification based on quasi-identifying data be measured and mitigated?

And, for database activity, including and especially queries, it's helpful to have an audit trail available to know what data was accessed, by whom, when, and where.

Solutions


For detection control, review the field-level protections specified in the self-documenting, human-readable job scripts, mapping diagrams, or configuration files used in the IRI FieldShield and IRI DarkShield data masking products, or the IRI Voracity data management platform.

For proof of what ran, log all jobs to the query-ready XML audit file. In the case of FieldShield, the audit trail contains the job script, which shows the protection technique(s) applied to each field in each table or file processed. Voracity mapping diagrams show the same changes quickly with orange connectors and the visual representations of the jobs are good images to share.

The log also contains other job metadata, like the:

  • protection library function(s) used
  • encryption keys or de-IDcodes
  • input and output tables or files
  • user who ran the job
  • job start and end times
  • number of records processed
Voracity Collage

For prevention control, you can review your jobs to validate a developer’s protections of output fields prior to execution.

For example, masking the SSN field in a payroll feed is a matter of connecting to your sources (or existing jobs) and clicking through a new job wizard or modifying existing parameters in a dialog or script. Some of the functions you can apply (ad hoc or as a rule), are:

  • encryption and decryption
  • anonymizationviapseudonymization
  • data masking
  • de-identificationandre-identification
  • field redaction
Voracity Collage

As a compliance officer, you can see the protection(s) in each self-documenting job script or diagram. Once approved, the job can be saved or run on any local or remote server running the IRIdata masking executable.

After execution, the job script can be isolated or shared, and modified or protected using EGit for example, for reliable re-use in production. In FieldShield, a re-ID risk scoring module is also supplied to statistically measure the likelihood of a data set being linked to an individual based on the unmasked quasi-identifying (demographic) attributes in their record. Further anonymizationtechniques like blurring and bucketing to generalize that data to lower the re-ID risk but preserve the data's utility for research and marketing purposes are included (see HIPAA and FERPAtabs above).

The proxy-based dynamic data masking system available with IRIFieldShieldis front-ended in a web application called SQL#. All database activity intercepted through the associated JDBCSQL Trail driver is recorded in an active logging environment, and exportable.

In the case of IRI DarkShield, an even more elaborate dashboard is provided to show data found vs. data masked:

Data Class Charts

This data can also be audited in machine-readable searching and masking artifacts in IRIWorkbench, or exported to SIEMtools like SplunkEnterprise Security for further analysis and action.

In the case of IRI CellShield EE, both data discovery results and masking operation audit trails are provided in Excel, and linked for export to Splunkand Datadog.

For more information on IRIdata forensics generally, see this page. Also, check out the data lineage options on this page.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.