Environment Title: SIEBEL Data Migration Approach in Secured Environment Page 1 of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential Table of Contents 14 "vervie5 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0 141 Scope of the document 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0 14' "vervie5 of Sie/el EIM 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0 140 Approach 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 ( 14( 6hat Doe! Data Ma!$ing Mean7 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 ( 148 6h3 Ma!$ Data7 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 8 149 Li!t "f Ma!$ing Techni:ue! 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 9 147 EIM 6ith Ma!$ed Data 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 7 Title: SIEBEL Data Migration Approach in Secured Environment Page ' of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential 1 !vervie" 11 Scope of the document The !cope of thi! document i! to accompli!h the migration activit3 in a highl3 !ecured cu!tomer environment&non-production*4 In the current pro;ect !cenario 5e have to migrate data from variou! legac3 data !ource! into one !ingle Sie/el +M application4 Due to the confidentialit3 of the data 5e cannot acce!! the real time tran!actional data4 To /uild the ne5 environment from the !cratch and cater all the e<i!ting proce!!e! there came a need to dump all the data e<i!ting in variou! hetrogeniou! data !ource to a !ingle tightl3 coupled Sie/el +M data/a!e4 To accompli!h thi! re:uirement 5e u!e Sie/el EIM proce!!4 1# !vervie" of Siebel EIM Sie/el Enterpri!e Integration Manager &EIM* manage! the /i-directional e<change of data /et5een the Sie/el data/a!e ta/le! and other corporate data/a!e!4 Thi! e<change of information i! accompli!hed through intermediar3 ta/le! called= EIM ta/le! &in earlier relea!e! of Sie/el application= the!e 5ere $no5n a! Interface Ta/le!*4 The EIM ta/le! act a! a !taging area /et5een the Sie/el application data/a!e and other data/a!e!4 +u!tomer! !hould u!e EIM to perform /ul$ import!= e<port!= update! and delete!4 +lear e<ample! of 5hen to u!e EIM are: 6hen initiall3 implementing a Sie/el application= u!er! !hould u!e EIM to load the Sie/el data/a!e ta/le! 5ith data and file attachment! created /3 e<ternal application!4 .or e<ample= u!er! might import information a/out product line! and product! from an Inventor3 +ontrol data/a!e into the >Product!? entit3 in the Sie/el data/a!e4 A! part of maintaining the data/a!e= u!er! can leverage EIM for data archival4 Thi! not onl3 provide! cu!tomer! 5ith a Sie/el data/a!e that i! optimall3 utili@ing the re!ource! availa/le to it= /ut al!o !treamline! the implementation of a corporate data archival !trateg34 6hen initiall3 implementing a non-Sie/el application= u!er! can e<port data from the Sie/el data/a!e ta/le! for u!e /3 that application4 .or e<ample= u!er! might e<port emplo3ee information to a human re!ource! application4 Title: SIEBEL Data Migration Approach in Secured Environment Page 0 of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential A! part of maintaining a non-Sie/el data/a!e= u!er! can update it 5ith information from the Sie/el data/a!e4 .or e<ample= u!er! might add ne5 cu!tomer! to an accounting data/a!e from the Sie/el data/a!e!4 +lear e<ample! 5hen cu!tomer! !hould con!ider u!ing other Sie/el product! &e<ample= Sie/el eAI* over Sie/el EIM: A! part of maintaining the data/a!e= 5here u!er! have a large num/er of ver3 thin update! &e<ample= 1 A 1) column!* to a ver3 narro5l3 defined !et of Sie/el /a!e ta/le! &0 ta/le! ma<imum*4 In thi! !cenario Sie/el eAI= utili@ing an integration o/;ect /a!ed on a /u!ine!! component 5ith onl3 the column! u!er! re:uire= thi! 5ill provide u!er! not onl3 5ith the re:uired functionalit3 /ut ma3 al!o provide a performance increa!e4 6hen the /u!ine!! re:uirement dictate! that real-time feed! /e availa/le from other enterpri!e application! that their emplo3ee! mu!t utili@e in order to accompli!h their ;o/!4 1$ Approach 6e have agreed upon an approach to MAS% the data and complete the development activit34 Thi! proce!! i! /etter $no5n a! DATA MAS%I1B4 1% &hat Does Data Mas'ing Mean( Data ma!$ing i! the proce!! of o/!curing &ma!$ing* !pecific data element! 5ithin data !tore!4 It en!ure! that !en!itive data i! replaced 5ith reali!tic /ut not real data4 The goal i! that !en!itive cu!tomer information i! not availa/le out!ide of the authori@ed environment4 Data ma!$ing i! t3picall3 done 5hile provi!ioning non-production environment! !o that copie! created to !upport te!t and development proce!!e! are not e<po!ing !en!itive information and thu! avoiding ri!$! of lea$ing4 Data Ma!$ing i! the replacement of e<i!ting !en!itive information in te!t or development data/a!e! 5ith information that loo$! real /ut i! of no u!e to an3one 5ho might 5i!h to mi!u!e it4 In general= the u!er! of the te!t= development or training data/a!e! do not need to !ee the actual information a! long a! 5hat the3 are loo$ing at loo$! real and i! con!i!tent4 Title: SIEBEL Data Migration Approach in Secured Environment Page ( of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential Effective data ma!$ing re:uire! the alteration of data in !uch a 5a3 that the actual value! cannot /e determined or re-engineered4 .unctional appearance i! maintained= !o effective te!ting i! po!!i/le4 Data can /e encr3pted and decr3pted= relational integrit3 remain!= !ecurit3 policie! can /e e!ta/li!hed and !eparation of dutie! /et5een !ecurit3 and admini!tration e!ta/li!hed4 1) &h* Mas' Data( Legal Requirements The regulator3 environment !urrounding the dutie! and o/ligation! of a data holder to protect the information the3 maintain are /ecoming increa!ingl3 rigorou! in ;u!t a/out ever3 legal ;uri!diction4 It i! a prett3 !afe a!!umption that the !tandard! for the !ecurit3 and maintenance of data 5ill /ecome increa!ingl3 !trict in the future4 Loss of Confidence And Public Relations Disasters It can rea!ona/l3 /e !aid in mo!t location!= that if a data e!cape happen! at 3our organi@ation= then the formal legal !anction! applied /3 governmental /odie! i! not the onl3 pro/lem 3ou 5ill /e facing4 Po!!i/l3 it ma3 not even /e the /igge!t of 3our immediate 5orrie!4 Inappropriate data e<po!ure= 5hether accidental or maliciou!= can have deva!tating con!e:uence!4 "ften the co!t! of !uch an event= /oth actual and un- :uantifia/le can far e<ceed an3 fine! levied for the violation of the rule!4 Malicious Exposure Mo!t people thin$ the ma;or ri!$ to the information the3 hold i! e<ternal entitie! &and organi@ed !3ndicate!* out to /rea$ in and !teal the data4 The a!!umption then follo5! that protecting the net5or$ and fire5all! i! the appropriate and !ufficient re!pon!e4 There i! no den3ing that !uch protection i! nece!!ar3 A ho5ever it ha! /een !ho5n that in man3 ca!e! the data i! !tolen /3 maliciou! in!ider! 5ho have /een granted acce!! to the data4 1o fire5all can $eep an in!ider from ac:uiring data under !uch circum!tance!4 2o5ever= /3 reducing the num/er of data/a!e! 5ith unma!$ed information= the overall ri!$ of e<po!ure i! mitigated4 The e<ternal hac$er!= if the3 get through the net5or$ !ecurit3= 5ill have far fe5er u!ea/le target! and a far greater proportion of the in!ide per!onnel 5ill have no acce!! to the real data4 Accidental Exposure The ri!$ of accidental e<po!ure of information i! often neglected 5hen con!idering the !ecurit3 ri!$! a!!ociated 5ith real te!t data4 "ften it i! thought that >there is no point in Title: SIEBEL Data Migration Approach in Secured Environment Page 8 of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential masking the test data because everybody has access to production anyways?4 1ot !o= the ri!$! a!!ociated 5ith an accidental e<po!ure of the data remain4 "ften ;u!t ma!$ing the mo!t !en!itive information &credit card num/er!= cu!tomer email addre!!e! etc* i! enough to !ome5hat mitigate the damage a!!ociated 5ith accidental e<po!ure and the ma!$ed data/a!e! remain ;u!t a! functional4 1+ List !f Mas'ing Techni,ues Substitution The Su/!titution techni:ue replace! the e<i!ting data 5ith random value! from a prepared data!et4 Shuffling The Shuffling techni:ue u!e! the e<i!ting data a! it! o5n !u/!titution data!et and move! the value! /et5een ro5! in !uch a 5a3 that no value! are pre!ent in their original ro5!4 Number and Date ariance The 1um/er and Date #ariance techni:ue varie! the e<i!ting value! in a !pecified range in order to o/fu!cate them4 .or e<ample= /irth date value! could /e changed 5ithin a range of CD- 9) da3!4 Encr!ption The Encr3ption techni:ue algorithmicall3 !cram/le! the data4 Thi! u!uall3 doe! not leave the data loo$ing reali!tic and can !ometime! ma$e the data larger4 Nulling "ut "r Deletion The 1ulling "ut techni:ue !impl3 remove! the !en!itive data /3 deleting it4 Mas#ing "ut If t5o ta/le! contain the column! 5ith the !ame denormali@ed data value! and tho!e column! are ma!$ed in one ta/le then the !econd ta/le 5ill need to /e updated 5ith the change!4 Thi! techni:ue i! called Ta/le-To-Ta/le S3nchroni@ation4 Title: SIEBEL Data Migration Approach in Secured Environment Page 9 of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential 1- EIM &ith Mas'ed Data 6e can develop the code 5ith the ma!$ed data a! it i! done u!uall34 Since ma!$ing techni:ue! maintain the functional appeareance 5e can u!e the defined EIM procedure!4 Good luck with your data masking in EIM. We hope this document will provide you with some useful topics to consider. If you have any questions about the contents of this document or data masking in general please do get in touch with us. We are happy to provide advice and assistance. Title: SIEBEL Data Migration Approach in Secured Environment Page 7 of 7 evi!ion: 1 "riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10 .ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf TCS Confidential