Why can't you debug a production issue, if you're using Format-Preserving 
Encryption? Does the application need the "real" data? Most do not. Or I'm not 
understanding your point.

Yes, there's overhead involved in encryption: Nothing is free. Would encryption 
have cost Heartland $20B? I doubt it. This is why encrypting everything isn't a 
good idea: massive overhead, breakage, and (with many modern storage 
subsystems) huge increases in storage requirements, as traditional encrypted 
data doesn't compress worth a darn.

Even a modest, 1M-row table is worth $200M if you believe the studies. That'll 
pay for a lot of hardware and software, and even a body or two to implement it! 
And even if the estimate is high by an order of magnitude, $20M is still some 
decent coin. Also don't forget the intangible costs of a breach -- folks don't 
like companies who leak, either as customers or investors.

Sure, there's pressure to do things on the cheap. And there's plenty of bad 
management who will decide to try to get away with it. Real management, of 
course, involves doing what's best in the long run, and ignoring PCI DSS (or 
GLBA, or Red Flag, or any of the others that may apply to your company) isn't 
part of that equation.

Don't get me wrong: the objections you're stating are valid. That doesn't mean 
they're sufficient to allow companies to rationally say "Naw, we don't need to 
be compliant with the law because it's hard/unpalatable/not perfect".

As for the CS rep, (s)he may indeed need to see at least *some* of the data, 
such as the last 4 digits of the SSN, or the address. But perhaps not my 
deposit history, unless I'm asking about that specifically. And those folks are 
already monitored and audited pretty closely; the rep who starts looking at 
everyone's deposit history will get noticed. In any case, these reps see only a 
relatively few records -- far more dangerous is the rogue DBA who decides that 
a private copy of the database would be fun to put on a USB drive.

To be blunt, whether you agree with masking or not, the regulations in place 
and coming WILL NOT allow you to use copies of production data for test. Sure, 
having honest folks is the norm and A Good Thing, but the regulations don't 
assume that you've reached that Nirvana. Nor should they.

(Hey, Robert, this is a fun discussion you started! Thanks!)

-----Original Message-----
From: Farley, Peter x23353 <[email protected]>
Date: Tue, Apr 21, 2009 at 5:27 PM
Subject: Re: [IBM-MAIN] Data masking/data disguise Primer 1) WHY
To: [email protected]

I'll jump in on this with a couple of thoughts from the application
programmer's standpoint.

Data masking may very well be needed to prevent the internal/employee
type of data breach (accidental or malicious).  However, it poses the
very serious problem that debugging production issues with production
data cannot (AFAIK) be done with "masking" in place unless the programs
are calling a "demasking" subroutine for every record/database row that
they process.  And when interactive debugging is used to resolve the
production issue (as is the "norm" these days), the plain-text values
are right there for the programmer to see and use -- or abuse.  Not to
mention that the unmasked values may also be right there in the dump,
for those who can read it.

If a production issue cannot be solved without the real offending data,
then enforced global "masking" prevents problems from being solved.
That is obviously not acceptable to either the programmer or to
management.

Also, adding the CPU overhead for "demasking" calls to already strained
CPU resources is going to cost the company large money, mainly in added
software costs for added MSU's to cover the "demasking" CPU usage.  Is
that added MSU software cost greater than the *potential* cost of a
breach?  Maybe, maybe not.  Especially when executive pay and perceived
"shareholder value" is tied to increasing profit by reducing "overhead"
like software MSU costs.  Cost/benefit analysis is not always carries
out by perfectly rational people.

And to take one of your own examples, the customer service agent for the
bank has an absolute need to see your very private information because
that's the exact information you are calling to ask about, and which
they must, by law, verify your identity against.  How can "masking" help
prevent employee abuse in that case?  In my view, it cannot.  Other
protocols are needed to protect against abuse in such cases, not least
among them serious audit and review capabilities, including key-loggers
and screen loggers and whatever other sorts of monitoring software as
can catch abuse for such sensitive work.

In the end, making sure your employees are honest (programmers and
service agents alike) and supporting them when they need it will be the
best solution to preventing breaches, IMHO.

Encrypting things that can be stolen or lost (tapes, hard drives, etc.)
does make sense to me, but masking on the mainframe just doesn't make
sense to me for too many real-world scenarios.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to