Вы находитесь на странице: 1из 8

S O L U T I O N P R O F I L E

Solix Secure Test and Development Solution – A New


Frontier in Securing Sensitive Information
April 2007

Sensitive information is increasingly finding its way into the hands of malicious
individuals either through external breaches or insider thefts from employees or
contractors. Database applications like ERP and CRM house vast repositories of
sensitive and private information such as salary and pay grade information,
customer data, Social Security numbers, credit card numbers, and financial data.
This data is highly regulated both externally and internally, and the risk of exposing this
sensitive information can result in stiff penalties and legal liabilities. In fact, in a March 2007
Taneja Group research study of large enterprises, 57% of end users reported that a data
security breach would cost over $500,000 in damages to their organization and 31% stated
that a breach would cost them over $1M.

Most enterprises maintain strict controls and security over production database applications
and their data. However test development environments for these types of applications
represent an Achilles heel. End users state that creating Test and Development (Test/Dev)
environments for this critical data results in security risks, hefty manual procedures, and heavy
storage requirements.

Solix has responded with a solution that securely and cost-effectively automates data cloning in
Test/Dev environments. This solution profile will discuss the data security context within
firms operating today and will highlight the key challenges that we hear from end users about
creating, maintaining, and securing test development environments. Lastly, we spotlight
Solix’s, Secure Test and Development solution and its key benefits.

IT Facing a New Reality in Data to re-assert controls and security to meet


Security compliance and regulatory legislation, to
safeguard data from insider tampering, and
The business context that firms must operate to prevent external breaches or leaks.
within has evolved dramatically over the past
five years. Data security, data privacy, and From our research, the following three
compliance issues have moved to the fore as drivers are causing IT organizations to re-
a slew of high profile breaches have evaluate and re-plan how they create,
showcased the vulnerabilities of companies’ manage, and maintain their Test/Dev
sensitive data. IT is being forced to adjust its environments:
processes and approaches to match this new
business context. The Test/Dev environment • Comply with government and
is one such area where IT has a strong need industry regulations. The very database
Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
1 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

applications that are the most critical in fundamental procedure in the Test/Dev
Test/Dev environments are the same process. In order to ensure high quality
applications that are the most highly testing of applications before they go into
regulated. Most enterprises must comply productions, QA and application developers
with external regulations including need to use realistic production quality data
Sarbanes Oxley (SOX), HIPAA, Gramm- so they can ensure the application will
Leach-Bliley Act (GLBA), and others. perform to exacting specifications in
Penalties for non-compliance can be production. As a result there is a strong need
severe. to clone and copy production stores for use in
application development, quality assurance
• Safeguard data from insider threats. (QA), application testing and training, and
Corporate environments are rife with user acceptance testing. However, cloning
internal threats to data. System production data sets is increasingly
administrators, database administrators, challenging given enterprise data growth
and application developers all maintain rates and the critical and highly regulated
high-level access to critical data, and may and sensitive nature of this data.
leak or expose sensitive data either
intentionally or inadvertently. Test/Dev Challenge #1: Labor Intensive. Manual
environments must have data protections cloning requires a massive effort spanning a
and security in place that guard against variety of cross-functional stakeholders.
both accidental and deliberate threats to Cloning large production data sets impacts
production data. storage, network bandwidth, host servers,
and databases; therefore involving at the
• Prevent external breaches. least network administrators, storage
Outsourcing and nearsourcing are common administrators, database administrators,
business practices, but they make it that system administrators, and business
much harder to protect data and to comply application owners. Time spent cloning data
with regulations. Companies remain liable is also problematic given slow file replication
for security breaches when outside technologies like File Transfer Protocol (FTP)
contractors are accessing copies of their or Remote Copy (RCP). FTP securely
crucial company data. In this context, transfers files between hosts that are using
securing Test/Dev environments is crucial different file systems or character sets such
to avoiding stiff legal liabilities and as EBCDIC or ASCII, and Remote Copy
penalties for non-compliance. (RCP) is the remote version of a copy
command. Cloning a 500 GB database using
Today’s Challenges of Creating, FTP or RCP can take days of data movement
Maintaining and Securing and manual management, and Test/Dev
Test/Dev Environments often requires multiple clones.

Cloning the production systems, including Challenge #2: Inefficient Storage


structured and unstructured data, is a Consumption. Since the Test/Dev
Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
2 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

environments must preserve relationships team – or worse, to any network user or


between data, cloned production database consultant who can access that storage.
applications are usually full clones
consuming vast amounts of space of Tier 1 The Business Case for a Secure
disk. The problem worsens as extra clones Test/Dev Solution
are created for additional or parallel
development and testing work. Many In spite of heavy overhead and security risks
organizations that we speak with report associated with traditional cloning,
maintaining seven or eight individual copies companies commonly make about eight
of production data. Therefore, a single 500 manual copies of each production database
GB database can easily consume over 3 TB of for Test/Dev environments. Depending on
Tier 1 storage capacity. the size of the database, manual clone
refreshes demand two to eleven days of staff
Challenge #3: Legal Liabilities & time alone. Automating the cloning process
Security Risks. Furthermore, data and user can reduce this time to less than a day, and
access is usually not as secure in the with block-based replication technology no
Test/Dev environment, as extremely longer than an hour. Storage resource
sensitive information is suddenly divorced requirements for automated clones also
from the careful security measures that shrink, with instance subsetting or pointer-
usually surround it in the production based cloning reducing required storage by
environment. The results of careless or as much as 50%.
malicious handling of this critical data can be
catastrophic. Human and storage resource savings can
easily total hundreds of thousands of dollars
For example, enterprise IT departments and a year, and with a secure cloning system the
DBAs carefully restrict usage of the database savings grow in proportion to lowering non-
data within the network. However, if a compliance risk. For example, the staffing
payroll processing development project is costs of cross functional personnel involved
outsourced, the outsourcer gains immediate in a manual clone can be slashed if the
and full access to sensitive and highly test/dev cloning process can be automated.
regulated employee data. Nonetheless, the As a result, valuable IT resources can focus
corporation that outsourced the project is on more strategic projects that directly add
still liable for ensuring the security and value to the business. Moreover,
protection of that data. In another example, organizations can reduce capital
take an internal development project. The expenditures on storage capacity by
production database is carefully stored on replicating the clones from tier 1 to tier 2
primary disk and is only accessible to a few storage. Assuming a 50% reduction in the
authenticated users. But the clone of the size of a clone through instance subsetting,
database is unwittingly placed on common this can easily result in savings of almost
networked storage, making it casually $100,000 in storage costs alone for a 500 GB
available to any member of the development database that must be replicated 8 times.
Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
3 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

clone an environment can be compressed


From our discussions with users, they report to a fraction of the time that it used to
the following key savings and efficiencies in take. A policy-driven automated process
their environments: will also allow IT to reduce its reliance on
software tools and manual scripts, which
1. Automate to Reduce Errors: IT saves money on purchases, human
administrators in charge of cloning a resources, and error-prone procedures.
production database application might
replicate the entire database and its 5. Cut CAPEX and OPEX Costs. A
associated application files using a copy Test/Dev cloning solution cuts cloning
application like FTP or RCP. However, time from days to minutes, slashing
this consumes large amounts of storage human resource requirements. The
and network bandwidth and takes a large solution should also support replicating
amount of manual oversight. cloned data onto less costly Tier 2 storage
such as a NetApp filer with SATA drives,
2. Use Recent Production Data for resulting in a 50% storage reduction
Better Accuracy: Cloning can be such a difference between full clones and
painful process that Test/Dev subsets. In addition, a Test/Dev cloning
environments end up working with solution can streamline clones by cloning
outdated copies. Using a cloning solution only the data and data relationships that
that quickly and efficiently clones recent the Test/Dev environment actually needs.
production data results in a more
accurate data set, ultimately improving Spotlight on Solix
business intelligence.
Founded in 2001, Solix Technologies is
3. Secure Sensitive Data to Protect focused on helping end users solve their
Against Legal Liabilities: Production compliance requirements and implement
databases often contain highly sensitive Information Lifecycle Management (ILM)
and regulated data, data that policies and procedures throughout their
unauthorized users should not see. When storage infrastructure. Its flagship product,
production database clones travel to Solix Enterprise Data Management Suite
outsourcers, trainers, and QA testers, (EDMS), organizes and manages all
those users should not be able to view any enterprise data including structured
sensitive information. (packaged and custom applications), semi-
structured (email) and unstructured
4. Leverage Efficient Block (documents and images) data. Solix Secure
Replication to Compress Time to Test and Development solution is a
Staging: Cloning at the file level requires standalone module built on top of EDMS. It
very long copy windows. If the Test/Dev enables the enterprise to securely and
solution can take advantage of block-level efficiently clone non-production databases
replication technology, then the time to for Test/Dev environments.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved


4 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

need. This streamlining capability – achieved


Solix Secure Test and Development solution through a process called instance subsetting -
combines data security techniques to protect - results in compact clones that replicate
individual data elements with the ability to quickly, use significantly less storage
streamline or shrink clones of production resources, and streamline Test/Dev
databases by removing large parts of the data environments.
sets that Test/Dev environments do not

Mask the
baseline
Prod Replication
Mirror / BCV QA
Replication Clones of the baseline
Prod are secure automatically
Test Train
Source
Target

Efficient Cloning while preserving relational integrity.


One of the core storage management Subsetting removes large data sets that are
operations of enterprise IT is the ability to not needed in the Test/Dev environment.
make multiple usable copies of data sets. This Removing the data from the clone eliminates
is applicable for a variety of enterprise the risk of exposure for that data. Another
processes including disaster recovery, significant benefit of instance subsetting is
testing, analysis, and development reduced storage because the clone is
environments. However, copy creation significantly smaller than full copies of the
technologies are less than ideal in production production database. Subsetting integrates
cloning where the Test/Dev environment database and application cloning and is
requires current data formatting, structure policy-driven.
and relationships. Traditional copy creation
can yield time gaps in the production copy, The compact clones retain a realistic look
impact the production environment with and feel to the non-production data for
quiescing, require code customization and accurate Test/Dev purposes, while securely
scripts, and demand manual intervention shielding the actual data from the Test/Dev
and management. environment workers. The users still have the
database structure they need, including
Solix uses a technology called instance application business rules and database
subsetting to clone subsets for Test/Dev relationships, data integrity and accuracy,

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved


5 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

and proper database access and control enterprise applications like Oracle,
including allocating rights to roles. PeopleSoft, SAP, and custom-built
applications. This allows Solix to apply data
Data Protection Techniques protection techniques to application data
Securing cloned database applications is a while preserving its referential integrity –
fundamental piece of the Test/Dev puzzle. vital for providing a structurally correct but
Solix provides a policy engine, multiple completely secure clone for the Test/Dev
security techniques, and knowledge bases to environment.
automate the secure cloning process. Since
even a single Test/Dev breach of sensitive Secure Elements
data can be disastrous, Solix provides a Solix uses scrambling, masking, encryption,
critical piece of technology for protecting nulling out, substitution, and shuffling
companies from data privacy and compliance techniques to secure database clones. All of
penalties and liabilities. the techniques employ the metadata
repository for applying policy-driven
Solix Secure Test and Development solution automation and a data model repository to
comes with a pre-populated knowledge base observe enterprise application data models.
containing over twenty populated data
security algorithms, and supports the ability • Data Scrambling uses an algorithm to
to add custom algorithms as needed. IT can scramble data so that it is completely
define security policies at the application indecipherable. Only when unscrambling
module, transaction, table or column level. algorithms are applied can the data be read
The same repository also operates for related again.
operations such as instance subsetting.
• Data Masking identifies columns of data
Users do not have to be data security experts and replaces existing characters with
to choose the correct set of algorithms. designated characters or numbers. The
Solix’s user interface lets users select the method preserves formatting for testing
sensitive database tables and columns they reports or user interfaces.
wish to protect and their security parameters.
Solix maintains a comprehensive knowledge • Encryption/Decryption encrypts data
base of metadata concerning an enterprise into special characters and destroys
application’s data model, which allows it to formatting so that the database is
automatically identify all places where a unreadable. Decryption keys revert data
column is referenced in a given application back into its readable form. Solix uses the
and apply secured values generated by the DES algorithm.
optimal data security algorithm.
• Nulling Out replaces an entire column
Solix’s knowledge base includes metadata on with null values. Nulling out is a limited
application data models from major technique as key data columns cannot

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved


6 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

always be made null, but is a simple and Benefit #3: Leverage replication
straightforward procedure. technology at the block level.
Solix supports enterprise block replication
• Substitution randomly replaces real
software from major storage vendors like
production data with realistic-looking fake
NetApp and EMC, so corporations can
data and preserves formatting. This
leverage their existing replication
substituted data has the same look and feel
technologies.
as the real data for accurate Test/Dev
purposes, but does not correlate with the
original data or data related to it. Solix Deployment Scenarios

• Shuffling is similar to substitution in that


it randomly replaces data with fake data. One of Solix’s Data Protection
The false values are obtained by shuffling characteristics is its flexibility when
column values, for instance by deliberately creating clones and replicating them to
mismatching first names with last names. different storage tiers. For example:

1. Tier 1 and Tier 2 storage on different


Key Benefits of Solix Data
platforms with no SAN. This
Security Solution environment requires host-based or
Benefit #1: Streamline non-production file-based replication to create an
databases for Test/Dev environments. initial clone, such as Veritas
Replication Exec or Volume Replicator.
After Solix creates a masked clone of the Full clones can take time to replicate,
production database, IT can choose to create but streamlined clones take much less.
streamlined copies of the clone by removing
large sets of data that are not necessary for a 2. Tier 1 and Tier 2 on different
given Test/Dev task. The remaining subset is platforms with a SAN. This setup
smaller, taking up fewer storage resources requires block-based replication. Users
and resulting in shorter testing times on should leverage data protection
limited subsets. software like NetApp’s Topio Data
Protection Suite (TDPS) or EMC
Benefit #2: Easily clone using the most
Recover Point (formerly Kashya).
recent production data.
Since cloning with Solix is simple and secure, 3. Tier 1 and Tier 2 on the same platform
it is easy to clone updated databases for with a SAN. In this case, the
Test/Dev environments. The compact and environment should leverage array
secure clones can themselves be cloned replication technology such as EMC
without threatening sensitive data or SAN Copy or NetApp FlexClone to
overwhelming storage resources. make full clones or snaps.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved


7 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com
S O L U T I O N P R O F I L E

Benefit #4: Cut costs. clones from unauthorized access while


Smaller clones result in as much as a 50% retaining full database integrity. Solix can
storage reduction difference between full also create streamlined clones, which
clones and subsets. Because Solix supports significantly reduces the overall data
block replication to secondary storage, the footprint of a Test/Dev clone and results in
enterprise can leverage existing replication dramatic cost savings. And its automation,
applications and replicate to less costly Tier 2 knowledge bases, and policy engine
storage, such as a NetApp filer with SATA dramatically cut OPEX costs by automating
drives. manual procedures.

Taneja Group Opinion We have already seen significant, high profile


data security breaches at large corporations
Test/Dev environments create tremendous due to lost unencrypted tapes and stolen
challenges to the enterprise in the form of laptops with sensitive information. Taneja
serious security risks, storage consumption, Group believes that it is only a matter of time
and high manual overhead. A single until a major storage security breach
production data breach can easily result in headline will be attributed to an unprotected
millions of dollars in liability for the test and development environment. We urge
company, yet today most companies have not corporations to reevaluate whether the
addressed the security of their test and security policies in place today are sufficient
development environments. As a result, they to protect sensitive information in
have left themselves open to severe legal outsourced or test and development
liabilities and stiff penalties. environments from falling into the wrong
hands. For those with significant
Within this context, Solix offers a clear, hard- outsourcing and insecure test development
cost ROI solution for securing and environments, we urge you to consider the
automating Test/Dev environments. Solix strong ROI potential that Solix provides.
data security techniques are instrumental in .
protecting Test/Dev database application

.NOTICE: The information and product recommendations made by the TANEJA GROUP are based upon public information and sources
and may also include personal opinions both of the TANEJA GROUP and others, all of which we believe to be accurate and reliable.
However, as market conditions change and not within our control, the information and recommendations are made without warranty of
any kind. All product names used and mentioned herein are the trademarks of their respective owners. The TANEJA GROUP, Inc. assumes
no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or
reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved


8 of 8
87 Elm Street, Suite 900 Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com

Вам также может понравиться