SlideShare a Scribd company logo
Integrating Information Protection
        into Data Architecture and SDLC
               Closing hidden gaps in your Software
                Development Life Cycle where Data
                    Governance is often absent


David Schlesinger CISSP
Senior Security Architect                     Dataversity Webinar
Davids@metadatasecurity.com
Author of The Hidden Corporation              11 December 2011
A Data Management Security Novel
Real Headline:“Protected Patient Data
                  Increasingly Being Lost, Stolen”
 By Cole Petrochko, Associate Staff Writer, MedPage Today
     Published: December 01, 2011

 • Nearly all healthcare organizations responding to a survey -- 96% --
   reported that patient or related information has been lost, stolen,
   or otherwise compromised within the last two years.
 • The number of data breaches involving protected health
   information rose by 32% from 2010, according to data published by
     the independent privacy and data protection group the Ponemon
     Institute.
 • Three out of 10 respondents (29%) said a data breach resulted in
   medical identity theft -- up 26%.
 • Two out of five respondents (41%) blamed data breaches on
   employee negligence -- not following data-handling procedures,
   sloppy mistakes, and using unsecure electronic devices -- and 49%
   reported lost or stolen devices.
            http://www.medpagetoday.com/PracticeManagement/InformationTechnology/29962

Davids@metadatasecurity.com            The Hidden Corporation                            2
A Few Key Points from
The Hidden Corporation
• Many Software Development Life Cycles (SLCD):
     – Are designed sequentially when critical processes should occur in
       parallel
     – Skip all data information categorization steps until the end
• This results in hidden governance gaps, inconsistent data
  protection, and reduced enterprise agility.
• Correcting this problem:
     – saves money,
     – saves time, and
     – reduces corporate risk.



Davids@metadatasecurity.com      The Hidden Corporation                    3
We are still in a Transition from a
            Legacy Data Environment
    1. We only used “our” information
       within “our” department
    2. Information lived in locked
       file cabinets in private offices.
    3. Local control was the best way to
       safeguard information –even on the
       Mainframe.
    4. External laws did not impact how we
       kept business information.
    5. We were not continuously
       connected to the global Internet.

Davids@metadatasecurity.com   The Hidden Corporation   4
Data Sensitivity Ignorance Usually Creates
    Regulatory Problems and Data Loss
                                           CEO


                         Finance          Shipping         Marketing


                        Billing Mgr.              Research         Sales Mgr.


                              Employees                              Sales Staff
           Private                         Ethnicity
                                           Private Data
            Data                              Data
                                           from Data
                                           Warehouse                    Consultant

   Data that is highly restricted in one department can
      sometimes be easily copied to laptops in another.
Davids@metadatasecurity.com               The Hidden Corporation                     5
Typical Data Governance Gaps




Business sees Data   Access Security                Legal team        Data Analysts are
     Regulatory         views Data              defines “risk” to         certain the
 Compliance as a        Regulatory                 the business         Business, the
  distraction from   Compliance as a                groups and         Legal team, and
 their “real work”      “business                    provides          Access Security
  and depends on    responsibility” and          requirements to      folks know which
  Access Security     depends on the            comply with data       data content is
and Legal to govern Business to govern              regulations       “supposed” to be
   sensitive data    user data content         in their local areas     authorized to
       content                                       of control           each user


  Davids@metadatasecurity.com       The Hidden Corporation                                6
“Design for Compliance” = A Typical Data
         Governance Process Method*
  The data governance methodology shown below was
  presented at a large conference as a way to ensure secure
  application development and regulatory control.

  Map                                                                        Design
                    Assess     Inventory         Classify           Design               Manage
  Business                                                                   & Operate
                    Risks      Controls          Data               Roles                Change
  Process                                                                    Controls




*Note that it shows the project team classifying their data after
they have assessed risks and put in controls. This assures re-
work after product launch, failed compliance audits, and lost
data later. (See slide 3)

 Davids@metadatasecurity.com               The Hidden Corporation                                 7
The Missing Parallel SDLC Processes
   Most software methodologies assume that magic happens
   and everybody knows which data is sensitive to regulations

 Map                                                                                         Design
                   Assess        Inventory             Classify            Design                             Manage
 Business                                                                                    & Operate
                   Risks         Controls              Data                Roles                              Change
 Process                                                                                     Controls



                                                                                           This step is local, informal,
         Data Architecture for Data                  Each Data Type                         and often the authorizing
       Protection Identifies Regulated              Links to Laws and                      manager is uninformed of
     Information and maps its location
                                                   Compliance Actions                      data sensitivity and policy

                  Identify &                                                                  Enforce user
  Define all                      Link Data to         Link data          Identify                             Perform
                  Classify all                                                                Controls at
  Business                        Compliance           Classification     Sensitive User                       Compliance
  Data used       Regulated                                                                   Authorization
                                  Actions              To Actions         Entitlements                         Audits
                  Data                                                                        Decision time



                                             This Step often skipped due to lack
                                             of an inventory of the data actually
                                              exposed in each User Entitlement
Davids@metadatasecurity.com                      The Hidden Corporation                                                8
Two Separate Steps + New Concept:
                  Entitlement
        1. A manager makes an Entitlement Decision about giving
           each user initial access Authorization.
        2. The ability for a worker to access the data in a view
           thereafter is granted by an Authorization based on that
           Entitlement.
                                                                        Identify the sensitive data in each
                                                                         individual view to determine its
                                                                         sensitivity. That determines the
                                                                        Entitlement’s action requirements.



                     Identify &                                Link data                            Enforce
  Define all                               Link Data to        Classification      Identify the     Controls at     Perform
                     Classify                                                                       Authorization
  Business                                 Compliance          To security         Sensitive User                   Compliance
  Data used
                     Regulated                                                                      Entitlement     Audits
                                           Actions             Actions             Entitlements     Decision
                     Data


* A few data regulations require specifically defined controls for named data types.
  Davids@metadatasecurity.com                             The Hidden Corporation                                                 9
Conceptual Process Model for Regulatory
      Compliance at User Entitlement Time
                                                                               Audit trail
                                                                               of actions
                                        Policies            Actions             fulfilling
                                        for data            for data           the policy
                                        Storage             Storage
 Define your               Link each
  Enterprise               regulatory
 information                Family to                                             Manager
and assign its             corporate                                              decides if
Regulatory and            compliance    Policies            Actions               worker is
                             policies                         for                Entitled to
   Security                             for user             user
  Sensitivity                           Access              Access
                                                                                   the data


                                                                 Audit trail     Entitlement
                                                                 of actions       Decision
                                                                  fulfilling    becomes a user
                                                                 the policy      Authorization


 Davids@metadatasecurity.com            The Hidden Corporation                                   10
Nancy Discovers that “Regulatory Family” is Not
the Same as a “Security Classification”
• A Security Classification tells people how sensitive the data is to the
  company. The approver needs to trust the employee; and the worker
  must have a “Need to Know”.
• A Regulation has nothing to do with trusting people. It tells the
  company how to protect the information and to which workers it may
  be legally exposed – little more.
• Regulations add the new rule of “Allowed to Know”
• Information can have only one security classification but may belong
  to several regulatory families.

      – Apples and Oranges.


Davids@metadatasecurity.com   The Hidden Corporation                    11
Key Learning: Most Data Regulations have Similar
       Requirements and fall into a Few Families

                    Personally                      Sarbanes-
                     Private                         Oxley &
                   Information                       Insider
                       US & EU    Industry            Data
                                  Specific,
                                 FDA, GLB,                         Trade
                                 Ctech, etc.                     Secrets &
         Business                                               Competitive
         Private -  PCI Data                       Future       Information
         Legal and    and                         Plans –
        Contractual California                   Mergers &
                    Statutes                    Divestitures


      Regulations often overlap, are redundant, give the same instructions,
      tell you to do the identical actions each time, and are redundant.

Davids@metadatasecurity.com       The Hidden Corporation                      12
The Regulatory Family is Sufficient for
    Identifying Most Aggregated Data Collections



                              FLAMMABLE!



 How much more information do you need to know about the
 contents of the tanker in order to manage your risk properly?


Davids@metadatasecurity.com    The Hidden Corporation            13
You know this database contains Private Data
      sensitive to PCI, and the Calif. & EU Statutes
          and must be Protected Accordingly



                              DB Contains tables with
                               Personally Private
                                 and PCI Data


        “ What you cannot identify, you cannot manage.”
                                       - Chief Information Security Officer of large defense firm.


Davids@metadatasecurity.com        The Hidden Corporation                                    14
Today, Data Moves Fast but Data Regulatory Sensitivity
   Knowledge Often Remains In Local Business Groups

         Marketing              Sales                                       Finance
                                              Orders             Delivery

  Research              Production
  & Product             & Planning
   Design                                 Data
                                        Warehouse                Products       Customers


                                                                               Access
     HR             Raw materials                                              Control
                    And suppliers                        Market
                                                        Research


  There is no specific group or system that captures information
   regulatory sensitivity and maintains it across the Enterprise
Davids@metadatasecurity.com             The Hidden Corporation                           15
Metadata must Capture all the data about Your
 Data that the Enterprise Needs to Know

• Technical Metadata includes character type,
  field length, decimal places, field name, etc.
• Data Quality Metadata often includes source system, bounds
  checking, refresh rate, the formula of a derived field, and
  currency type used in a transaction.
• Security Metadata is often left out, but is the Security
  Classification.
• Regulatory Metadata is almost always left out, but would
  include the families of all regulations that direct the storage
  and exposure of this Regulated Information.
                                                       -Not an inclusive list.

Davids@metadatasecurity.com   The Hidden Corporation                      16
Collect Regulatory Metadata in your Central
 Data Directory to Link the Knowledge Silos


                          “Insider”          Business Private
                        Information                                 PCI & Calif.
                                               Information         Requirements



    Security
    Policies                            Central
                                       Metadata
                                       Directory
                                                                     Data
                                                                   Retention




           HIPAA                 Personal
            Data                 Privacy:                 Trade     Sarbanes
                                US and EU                Secrets     Oxley


Davids@metadatasecurity.com           The Hidden Corporation                       17
Actions are Required For Regulatory
Compliance to Be Functional

   • In the book, Nancy shows why you must distill
     each regulation down into specific physical
     actions (work assignments) that satisfy regulatory
     requirements and company policy
   • Inform business managers who determine user
     authorizations about the information protection
     actions required for each User Entitlement
   • Design your process so that when specific actions
     are taken, they leave an audit trail.

Davids@metadatasecurity.com   The Hidden Corporation      18
Nancy’s Iron Law of Action

                  No Regulatory
                Compliance Can Be
                  Proven to Have
              Happened Unless There
              is The Audit Trail of An
                      Action.
Davids@metadatasecurity.com   The Hidden Corporation   19
Data Protection Up Front
     Encourages Agility

   • Putting regulatory data risk analysis at the design
     stage of a new software acquisition project lets the
     project team build regulatory safeguards into the
     architecture and system design from the start.
   • Without the worry of having to stop and change
     their work at the end for “security reasons,” the
     project team can design the data processing in a
     way that naturally protects the Regulated
     Information as part of its normal function.

Davids@metadatasecurity.com   The Hidden Corporation    20
Engage All Your
       Corporate Partners
  1. Introduce information definition and regulatory policy
          enforcement as initial design requirements for all new
          applications, web systems, and databases (DBMS)
  2.      Help Data Analysts and Data Architects define the data’s
          sensitivity by leveraging your business leaders’ knowledge
  3.      Get the existing data policies from Information Security
          regarding actions protecting classified information
  4.      Interview Corporate Counsel to learn their data protection
          polices and actions (“Guidelines” will usually be forgotten)
  5.      Engage data governance stewards and tell them you feel
          their pain and want their policies that require actions

Davids@metadatasecurity.com    The Hidden Corporation                21
Stop Playing “Whack-A-Mole ”                   ®




Sarbanes-Oxley Act, Personal Privacy,
PCI, HIPAA, FISMA, PIPEDA, Gramm-
Leach, SB 1386, GAAP, and the U.S.
Patriot Act ALL affect your data and
their instructions greatly overlap!
Multiple, single-regulation
governance initiatives design
multiple, redundant data compliance
solutions.
Isolated response to each new
information law assures inconsistent
compliance, and is the corporate
                                    ®
equivalent of playing Whack-A-Mole .


Davids@metadatasecurity.com   The Hidden Corporation       22
for Attending

            Closing hidden gaps in your Software Development Life Cycle
                       where Data Governance is often absent



                                            David Schlesinger CISSP
                                            Senior Security Architect
                                            Metadata Security LLC
                                            davids@metadatasecurity.com
                                            602-697-4954




                                            Author of The Hidden Corporation
                                            Perhaps the world’s first
                                            Data Management Security Novel
                                            Discount Code for Attendees:
                                                 HiddenCorp20 at amazon.com



Davids@metadatasecurity.com       The Hidden Corporation                       23

More Related Content

PPTX
SEIM-Microsoft Sentinel.pptx
PPTX
Secure Software Development Life Cycle (SSDLC)
PDF
Application Threat Modeling
PPSX
Next-Gen security operation center
PDF
IBM QRadar Security Intelligence Overview
PDF
TH3 Professional Developper CEH social engineering
PPTX
Cyber Threat Modeling
PDF
[Atlassian meets dev ops and itsm] kakao meets jira
SEIM-Microsoft Sentinel.pptx
Secure Software Development Life Cycle (SSDLC)
Application Threat Modeling
Next-Gen security operation center
IBM QRadar Security Intelligence Overview
TH3 Professional Developper CEH social engineering
Cyber Threat Modeling
[Atlassian meets dev ops and itsm] kakao meets jira

What's hot (20)

PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Oscp preparation
PDF
Security Patterns for Software Development
PDF
Introduction to QRadar
PDF
Secure Coding - Web Application Security Vulnerabilities and Best Practices
PPTX
Splunk Phantom SOAR Roundtable
PPT
SQL Slammer Worm
PPTX
Perspectivas en ciberseguridad para el año 2024
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Threat Hunting with Cyber Kill Chain
PDF
Embedded Systems Security
PPTX
Privileged Access Management (PAM)
PPTX
IBM Security QRadar
PPTX
DevSecOps without DevOps is Just Security
PDF
1.1 Data Security Presentation.pdf
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
Something Fun About Using SIEM by Dr. Anton Chuvakin
PDF
Secure Code Review 101
PPTX
Sql injection attack
From SIEM to SOC: Crossing the Cybersecurity Chasm
Oscp preparation
Security Patterns for Software Development
Introduction to QRadar
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Splunk Phantom SOAR Roundtable
SQL Slammer Worm
Perspectivas en ciberseguridad para el año 2024
Cybersecurity 1. intro to cybersecurity
Threat Hunting with Cyber Kill Chain
Embedded Systems Security
Privileged Access Management (PAM)
IBM Security QRadar
DevSecOps without DevOps is Just Security
1.1 Data Security Presentation.pdf
Threat Intelligence 101 - Steve Lodin - Submitted
Something Fun About Using SIEM by Dr. Anton Chuvakin
Secure Code Review 101
Sql injection attack
Ad

Similar to Integrating Information Protection Into Data Architecture & SDLC (20)

PDF
Information builders gartner mdm - barcelona 2-7-2013
PDF
How to Secure Your Files with DLP and FAM
PDF
Data Without Borders
PDF
Data Governance And Technology Enablement First San Francisco Partners 2009
PPTX
Electronic data & record management
PDF
Ibm data governance framework
PPTX
Metadata Use Cases
PPTX
Metadata Use Cases You Can Use
PDF
Closing the Governance Gap - Enabling Governed Self-Service Analytics
PDF
Prepare For Breaches Like a Pro
PPT
The impact of regulatory compliance on DBA(latest)
PDF
Health Data Encryption: The Seven Principals of Privacy
PDF
DataEd Online: Unlock Business Value through Data Governance
PDF
Data-Ed: Unlock Business Value through Data Governance
PDF
Ssi Data Protection Solutions V0.2
PDF
Looking Beyond GDPR Compliance Deadline
PDF
sunil_soares_dama_day.pdf
PDF
Cloud Auditing
PDF
ISSA DLP Presentation - Oxford Consulting Group
PDF
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
Information builders gartner mdm - barcelona 2-7-2013
How to Secure Your Files with DLP and FAM
Data Without Borders
Data Governance And Technology Enablement First San Francisco Partners 2009
Electronic data & record management
Ibm data governance framework
Metadata Use Cases
Metadata Use Cases You Can Use
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Prepare For Breaches Like a Pro
The impact of regulatory compliance on DBA(latest)
Health Data Encryption: The Seven Principals of Privacy
DataEd Online: Unlock Business Value through Data Governance
Data-Ed: Unlock Business Value through Data Governance
Ssi Data Protection Solutions V0.2
Looking Beyond GDPR Compliance Deadline
sunil_soares_dama_day.pdf
Cloud Auditing
ISSA DLP Presentation - Oxford Consulting Group
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
Ad

More from DATAVERSITY (20)

PDF
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
PDF
Data at the Speed of Business with Data Mastering and Governance
PDF
Exploring Levels of Data Literacy
PDF
Building a Data Strategy – Practical Steps for Aligning with Business Goals
PDF
Make Data Work for You
PDF
Data Catalogs Are the Answer – What is the Question?
PDF
Data Catalogs Are the Answer – What Is the Question?
PDF
Data Modeling Fundamentals
PDF
Showing ROI for Your Analytic Project
PDF
How a Semantic Layer Makes Data Mesh Work at Scale
PDF
Is Enterprise Data Literacy Possible?
PDF
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
PDF
Emerging Trends in Data Architecture – What’s the Next Big Thing?
PDF
Data Governance Trends - A Look Backwards and Forwards
PDF
Data Governance Trends and Best Practices To Implement Today
PDF
2023 Trends in Enterprise Analytics
PDF
Data Strategy Best Practices
PDF
Who Should Own Data Governance – IT or Business?
PDF
Data Management Best Practices
PDF
MLOps – Applying DevOps to Competitive Advantage
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Data at the Speed of Business with Data Mastering and Governance
Exploring Levels of Data Literacy
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Make Data Work for You
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What Is the Question?
Data Modeling Fundamentals
Showing ROI for Your Analytic Project
How a Semantic Layer Makes Data Mesh Work at Scale
Is Enterprise Data Literacy Possible?
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends and Best Practices To Implement Today
2023 Trends in Enterprise Analytics
Data Strategy Best Practices
Who Should Own Data Governance – IT or Business?
Data Management Best Practices
MLOps – Applying DevOps to Competitive Advantage

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Understanding_Digital_Forensics_Presentation.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
sap open course for s4hana steps from ECC to s4
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I

Integrating Information Protection Into Data Architecture & SDLC

  • 1. Integrating Information Protection into Data Architecture and SDLC Closing hidden gaps in your Software Development Life Cycle where Data Governance is often absent David Schlesinger CISSP Senior Security Architect Dataversity Webinar Davids@metadatasecurity.com Author of The Hidden Corporation 11 December 2011 A Data Management Security Novel
  • 2. Real Headline:“Protected Patient Data Increasingly Being Lost, Stolen” By Cole Petrochko, Associate Staff Writer, MedPage Today Published: December 01, 2011 • Nearly all healthcare organizations responding to a survey -- 96% -- reported that patient or related information has been lost, stolen, or otherwise compromised within the last two years. • The number of data breaches involving protected health information rose by 32% from 2010, according to data published by the independent privacy and data protection group the Ponemon Institute. • Three out of 10 respondents (29%) said a data breach resulted in medical identity theft -- up 26%. • Two out of five respondents (41%) blamed data breaches on employee negligence -- not following data-handling procedures, sloppy mistakes, and using unsecure electronic devices -- and 49% reported lost or stolen devices. http://www.medpagetoday.com/PracticeManagement/InformationTechnology/29962 Davids@metadatasecurity.com The Hidden Corporation 2
  • 3. A Few Key Points from The Hidden Corporation • Many Software Development Life Cycles (SLCD): – Are designed sequentially when critical processes should occur in parallel – Skip all data information categorization steps until the end • This results in hidden governance gaps, inconsistent data protection, and reduced enterprise agility. • Correcting this problem: – saves money, – saves time, and – reduces corporate risk. Davids@metadatasecurity.com The Hidden Corporation 3
  • 4. We are still in a Transition from a Legacy Data Environment 1. We only used “our” information within “our” department 2. Information lived in locked file cabinets in private offices. 3. Local control was the best way to safeguard information –even on the Mainframe. 4. External laws did not impact how we kept business information. 5. We were not continuously connected to the global Internet. Davids@metadatasecurity.com The Hidden Corporation 4
  • 5. Data Sensitivity Ignorance Usually Creates Regulatory Problems and Data Loss CEO Finance Shipping Marketing Billing Mgr. Research Sales Mgr. Employees Sales Staff Private Ethnicity Private Data Data Data from Data Warehouse Consultant Data that is highly restricted in one department can sometimes be easily copied to laptops in another. Davids@metadatasecurity.com The Hidden Corporation 5
  • 6. Typical Data Governance Gaps Business sees Data Access Security Legal team Data Analysts are Regulatory views Data defines “risk” to certain the Compliance as a Regulatory the business Business, the distraction from Compliance as a groups and Legal team, and their “real work” “business provides Access Security and depends on responsibility” and requirements to folks know which Access Security depends on the comply with data data content is and Legal to govern Business to govern regulations “supposed” to be sensitive data user data content in their local areas authorized to content of control each user Davids@metadatasecurity.com The Hidden Corporation 6
  • 7. “Design for Compliance” = A Typical Data Governance Process Method* The data governance methodology shown below was presented at a large conference as a way to ensure secure application development and regulatory control. Map Design Assess Inventory Classify Design Manage Business & Operate Risks Controls Data Roles Change Process Controls *Note that it shows the project team classifying their data after they have assessed risks and put in controls. This assures re- work after product launch, failed compliance audits, and lost data later. (See slide 3) Davids@metadatasecurity.com The Hidden Corporation 7
  • 8. The Missing Parallel SDLC Processes Most software methodologies assume that magic happens and everybody knows which data is sensitive to regulations Map Design Assess Inventory Classify Design Manage Business & Operate Risks Controls Data Roles Change Process Controls This step is local, informal, Data Architecture for Data Each Data Type and often the authorizing Protection Identifies Regulated Links to Laws and manager is uninformed of Information and maps its location Compliance Actions data sensitivity and policy Identify & Enforce user Define all Link Data to Link data Identify Perform Classify all Controls at Business Compliance Classification Sensitive User Compliance Data used Regulated Authorization Actions To Actions Entitlements Audits Data Decision time This Step often skipped due to lack of an inventory of the data actually exposed in each User Entitlement Davids@metadatasecurity.com The Hidden Corporation 8
  • 9. Two Separate Steps + New Concept: Entitlement 1. A manager makes an Entitlement Decision about giving each user initial access Authorization. 2. The ability for a worker to access the data in a view thereafter is granted by an Authorization based on that Entitlement. Identify the sensitive data in each individual view to determine its sensitivity. That determines the Entitlement’s action requirements. Identify & Link data Enforce Define all Link Data to Classification Identify the Controls at Perform Classify Authorization Business Compliance To security Sensitive User Compliance Data used Regulated Entitlement Audits Actions Actions Entitlements Decision Data * A few data regulations require specifically defined controls for named data types. Davids@metadatasecurity.com The Hidden Corporation 9
  • 10. Conceptual Process Model for Regulatory Compliance at User Entitlement Time Audit trail of actions Policies Actions fulfilling for data for data the policy Storage Storage Define your Link each Enterprise regulatory information Family to Manager and assign its corporate decides if Regulatory and compliance Policies Actions worker is policies for Entitled to Security for user user Sensitivity Access Access the data Audit trail Entitlement of actions Decision fulfilling becomes a user the policy Authorization Davids@metadatasecurity.com The Hidden Corporation 10
  • 11. Nancy Discovers that “Regulatory Family” is Not the Same as a “Security Classification” • A Security Classification tells people how sensitive the data is to the company. The approver needs to trust the employee; and the worker must have a “Need to Know”. • A Regulation has nothing to do with trusting people. It tells the company how to protect the information and to which workers it may be legally exposed – little more. • Regulations add the new rule of “Allowed to Know” • Information can have only one security classification but may belong to several regulatory families. – Apples and Oranges. Davids@metadatasecurity.com The Hidden Corporation 11
  • 12. Key Learning: Most Data Regulations have Similar Requirements and fall into a Few Families Personally Sarbanes- Private Oxley & Information Insider US & EU Industry Data Specific, FDA, GLB, Trade Ctech, etc. Secrets & Business Competitive Private - PCI Data Future Information Legal and and Plans – Contractual California Mergers & Statutes Divestitures Regulations often overlap, are redundant, give the same instructions, tell you to do the identical actions each time, and are redundant. Davids@metadatasecurity.com The Hidden Corporation 12
  • 13. The Regulatory Family is Sufficient for Identifying Most Aggregated Data Collections FLAMMABLE! How much more information do you need to know about the contents of the tanker in order to manage your risk properly? Davids@metadatasecurity.com The Hidden Corporation 13
  • 14. You know this database contains Private Data sensitive to PCI, and the Calif. & EU Statutes and must be Protected Accordingly DB Contains tables with Personally Private and PCI Data “ What you cannot identify, you cannot manage.” - Chief Information Security Officer of large defense firm. Davids@metadatasecurity.com The Hidden Corporation 14
  • 15. Today, Data Moves Fast but Data Regulatory Sensitivity Knowledge Often Remains In Local Business Groups Marketing Sales Finance Orders Delivery Research Production & Product & Planning Design Data Warehouse Products Customers Access HR Raw materials Control And suppliers Market Research There is no specific group or system that captures information regulatory sensitivity and maintains it across the Enterprise Davids@metadatasecurity.com The Hidden Corporation 15
  • 16. Metadata must Capture all the data about Your Data that the Enterprise Needs to Know • Technical Metadata includes character type, field length, decimal places, field name, etc. • Data Quality Metadata often includes source system, bounds checking, refresh rate, the formula of a derived field, and currency type used in a transaction. • Security Metadata is often left out, but is the Security Classification. • Regulatory Metadata is almost always left out, but would include the families of all regulations that direct the storage and exposure of this Regulated Information. -Not an inclusive list. Davids@metadatasecurity.com The Hidden Corporation 16
  • 17. Collect Regulatory Metadata in your Central Data Directory to Link the Knowledge Silos “Insider” Business Private Information PCI & Calif. Information Requirements Security Policies Central Metadata Directory Data Retention HIPAA Personal Data Privacy: Trade Sarbanes US and EU Secrets Oxley Davids@metadatasecurity.com The Hidden Corporation 17
  • 18. Actions are Required For Regulatory Compliance to Be Functional • In the book, Nancy shows why you must distill each regulation down into specific physical actions (work assignments) that satisfy regulatory requirements and company policy • Inform business managers who determine user authorizations about the information protection actions required for each User Entitlement • Design your process so that when specific actions are taken, they leave an audit trail. Davids@metadatasecurity.com The Hidden Corporation 18
  • 19. Nancy’s Iron Law of Action No Regulatory Compliance Can Be Proven to Have Happened Unless There is The Audit Trail of An Action. Davids@metadatasecurity.com The Hidden Corporation 19
  • 20. Data Protection Up Front Encourages Agility • Putting regulatory data risk analysis at the design stage of a new software acquisition project lets the project team build regulatory safeguards into the architecture and system design from the start. • Without the worry of having to stop and change their work at the end for “security reasons,” the project team can design the data processing in a way that naturally protects the Regulated Information as part of its normal function. Davids@metadatasecurity.com The Hidden Corporation 20
  • 21. Engage All Your Corporate Partners 1. Introduce information definition and regulatory policy enforcement as initial design requirements for all new applications, web systems, and databases (DBMS) 2. Help Data Analysts and Data Architects define the data’s sensitivity by leveraging your business leaders’ knowledge 3. Get the existing data policies from Information Security regarding actions protecting classified information 4. Interview Corporate Counsel to learn their data protection polices and actions (“Guidelines” will usually be forgotten) 5. Engage data governance stewards and tell them you feel their pain and want their policies that require actions Davids@metadatasecurity.com The Hidden Corporation 21
  • 22. Stop Playing “Whack-A-Mole ” ® Sarbanes-Oxley Act, Personal Privacy, PCI, HIPAA, FISMA, PIPEDA, Gramm- Leach, SB 1386, GAAP, and the U.S. Patriot Act ALL affect your data and their instructions greatly overlap! Multiple, single-regulation governance initiatives design multiple, redundant data compliance solutions. Isolated response to each new information law assures inconsistent compliance, and is the corporate ® equivalent of playing Whack-A-Mole . Davids@metadatasecurity.com The Hidden Corporation 22
  • 23. for Attending Closing hidden gaps in your Software Development Life Cycle where Data Governance is often absent David Schlesinger CISSP Senior Security Architect Metadata Security LLC davids@metadatasecurity.com 602-697-4954 Author of The Hidden Corporation Perhaps the world’s first Data Management Security Novel Discount Code for Attendees: HiddenCorp20 at amazon.com Davids@metadatasecurity.com The Hidden Corporation 23