Product articles

  • Strategy

Test Data Management and SOC 2 Compliance

Using live data outside production is one of the fastest ways to create compliance risk, because it quickly becomes harder to control who can access it, how it is handled, and how long it is kept. A Test Data Management (TDM) approach provides exactly the kind of controls SOC 2 auditors look for in this situation: an automated, traceable end-to-end process for protecting, provisioning, and removing customer data so it can be used safely in non-production environments. Read more

The Importance of Access Checks and Controls in Database Development

This article illustrates the importance in any database development project of a 'multi-layered' approach to database access controls and security checks, based on the Principle of Least Privilege. It describes a security incident that was raised when databases related to a local development project were found to have been erroneously deployed to a remote test server. It explains the nature of the incident, what went wrong that allowed it to happen, and the measures that were put in place to prevent its recurrence. Read more

Data Masking in Practice

This article takes a strategic look at common data masking and anonymization techniques, and the challenges inherent in protecting certain types of sensitive and personal data, while ensuring that it still looks like the real data, and retains its referential integrity, and distribution characteristics. It also explains, briefly, with references, the tools that one can use to mask different types of data and how to provision development and test machines with these 'de-sensitized' databases, or alternatively to produce fake data that looks like the real thing, but in fact is generated randomly. Read more