Sie sind auf Seite 1von 7

SIEBEL

Data Migration Approach in Secured


Environment
Title: SIEBEL Data Migration Approach in Secured Environment Page 1 of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
Table of Contents
14 "vervie5 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0
141 Scope of the document 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0
14' "vervie5 of Sie/el EIM 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 0
140 Approach 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 (
14( 6hat Doe! Data Ma!$ing Mean7 4444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 (
148 6h3 Ma!$ Data7 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 8
149 Li!t "f Ma!$ing Techni:ue! 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 9
147 EIM 6ith Ma!$ed Data 44444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 7
Title: SIEBEL Data Migration Approach in Secured Environment Page ' of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
1 !vervie"
11 Scope of the document
The !cope of thi! document i! to accompli!h the migration activit3 in a highl3 !ecured
cu!tomer environment&non-production*4
In the current pro;ect !cenario 5e have to migrate data from variou! legac3 data !ource!
into one !ingle Sie/el +M application4 Due to the confidentialit3 of the data 5e cannot
acce!! the real time tran!actional data4 To /uild the ne5 environment from the !cratch
and cater all the e<i!ting proce!!e! there came a need to dump all the data e<i!ting in
variou! hetrogeniou! data !ource to a !ingle tightl3 coupled Sie/el +M data/a!e4
To accompli!h thi! re:uirement 5e u!e Sie/el EIM proce!!4
1# !vervie" of Siebel EIM
Sie/el Enterpri!e Integration Manager &EIM* manage! the /i-directional e<change of data
/et5een the Sie/el data/a!e ta/le! and other corporate data/a!e!4 Thi! e<change of
information i! accompli!hed through intermediar3 ta/le! called= EIM ta/le! &in earlier
relea!e! of Sie/el application= the!e 5ere $no5n a! Interface Ta/le!*4 The EIM ta/le! act
a! a !taging area /et5een the Sie/el application data/a!e and other data/a!e!4
+u!tomer! !hould u!e EIM to perform /ul$ import!= e<port!= update! and delete!4 +lear
e<ample! of 5hen to u!e EIM are:
6hen initiall3 implementing a Sie/el application= u!er! !hould u!e EIM to load the
Sie/el data/a!e ta/le! 5ith data and file attachment! created /3 e<ternal
application!4 .or e<ample= u!er! might import information a/out product line! and
product! from an Inventor3 +ontrol data/a!e into the >Product!? entit3 in the
Sie/el data/a!e4
A! part of maintaining the data/a!e= u!er! can leverage EIM for data archival4
Thi! not onl3 provide! cu!tomer! 5ith a Sie/el data/a!e that i! optimall3 utili@ing
the re!ource! availa/le to it= /ut al!o !treamline! the implementation of a
corporate data archival !trateg34
6hen initiall3 implementing a non-Sie/el application= u!er! can e<port data from
the Sie/el data/a!e ta/le! for u!e /3 that application4 .or e<ample= u!er! might
e<port emplo3ee information to a human re!ource! application4
Title: SIEBEL Data Migration Approach in Secured Environment Page 0 of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
A! part of maintaining a non-Sie/el data/a!e= u!er! can update it 5ith
information from the Sie/el data/a!e4 .or e<ample= u!er! might add ne5
cu!tomer! to an accounting data/a!e from the Sie/el data/a!e!4
+lear e<ample! 5hen cu!tomer! !hould con!ider u!ing other Sie/el product! &e<ample=
Sie/el eAI* over Sie/el EIM:
A! part of maintaining the data/a!e= 5here u!er! have a large num/er of ver3 thin
update! &e<ample= 1 A 1) column!* to a ver3 narro5l3 defined !et of Sie/el /a!e
ta/le! &0 ta/le! ma<imum*4 In thi! !cenario Sie/el eAI= utili@ing an integration
o/;ect /a!ed on a /u!ine!! component 5ith onl3 the column! u!er! re:uire= thi!
5ill provide u!er! not onl3 5ith the re:uired functionalit3 /ut ma3 al!o provide a
performance increa!e4
6hen the /u!ine!! re:uirement dictate! that real-time feed! /e availa/le from
other enterpri!e application! that their emplo3ee! mu!t utili@e in order to
accompli!h their ;o/!4
1$ Approach
6e have agreed upon an approach to MAS% the data and complete the development
activit34 Thi! proce!! i! /etter $no5n a! DATA MAS%I1B4
1% &hat Does Data Mas'ing Mean(
Data ma!$ing i! the proce!! of o/!curing &ma!$ing* !pecific data element! 5ithin data
!tore!4 It en!ure! that !en!itive data i! replaced 5ith reali!tic /ut not real data4 The goal
i! that !en!itive cu!tomer information i! not availa/le out!ide of the authori@ed
environment4 Data ma!$ing i! t3picall3 done 5hile provi!ioning non-production
environment! !o that copie! created to !upport te!t and development proce!!e! are not
e<po!ing !en!itive information and thu! avoiding ri!$! of lea$ing4
Data Ma!$ing i! the replacement of e<i!ting !en!itive information in te!t or development
data/a!e! 5ith information that loo$! real /ut i! of no u!e to an3one 5ho might 5i!h to
mi!u!e it4 In general= the u!er! of the te!t= development or training data/a!e! do not
need to !ee the actual information a! long a! 5hat the3 are loo$ing at loo$! real and i!
con!i!tent4
Title: SIEBEL Data Migration Approach in Secured Environment Page ( of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
Effective data ma!$ing re:uire! the alteration of data in !uch a 5a3 that the actual value!
cannot /e determined or re-engineered4 .unctional appearance i! maintained= !o
effective te!ting i! po!!i/le4 Data can /e encr3pted and decr3pted= relational integrit3
remain!= !ecurit3 policie! can /e e!ta/li!hed and !eparation of dutie! /et5een !ecurit3
and admini!tration e!ta/li!hed4
1) &h* Mas' Data(
Legal Requirements
The regulator3 environment !urrounding the dutie! and o/ligation! of a data holder to
protect the information the3 maintain are /ecoming increa!ingl3 rigorou! in ;u!t a/out
ever3 legal ;uri!diction4 It i! a prett3 !afe a!!umption that the !tandard! for the !ecurit3
and maintenance of data 5ill /ecome increa!ingl3 !trict in the future4
Loss of Confidence And Public Relations Disasters
It can rea!ona/l3 /e !aid in mo!t location!= that if a data e!cape happen! at 3our
organi@ation= then the formal legal !anction! applied /3 governmental /odie! i! not the
onl3 pro/lem 3ou 5ill /e facing4 Po!!i/l3 it ma3 not even /e the /igge!t of 3our
immediate 5orrie!4 Inappropriate data e<po!ure= 5hether accidental or maliciou!= can
have deva!tating con!e:uence!4 "ften the co!t! of !uch an event= /oth actual and un-
:uantifia/le can far e<ceed an3 fine! levied for the violation of the rule!4
Malicious Exposure
Mo!t people thin$ the ma;or ri!$ to the information the3 hold i! e<ternal entitie! &and
organi@ed !3ndicate!* out to /rea$ in and !teal the data4 The a!!umption then follo5!
that protecting the net5or$ and fire5all! i! the appropriate and !ufficient re!pon!e4 There
i! no den3ing that !uch protection i! nece!!ar3 A ho5ever it ha! /een !ho5n that in man3
ca!e! the data i! !tolen /3 maliciou! in!ider! 5ho have /een granted acce!! to the data4
1o fire5all can $eep an in!ider from ac:uiring data under !uch circum!tance!4 2o5ever=
/3 reducing the num/er of data/a!e! 5ith unma!$ed information= the overall ri!$ of
e<po!ure i! mitigated4 The e<ternal hac$er!= if the3 get through the net5or$ !ecurit3= 5ill
have far fe5er u!ea/le target! and a far greater proportion of the in!ide per!onnel 5ill
have no acce!! to the real data4
Accidental Exposure
The ri!$ of accidental e<po!ure of information i! often neglected 5hen con!idering the
!ecurit3 ri!$! a!!ociated 5ith real te!t data4 "ften it i! thought that >there is no point in
Title: SIEBEL Data Migration Approach in Secured Environment Page 8 of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
masking the test data because everybody has access to production anyways?4 1ot !o= the
ri!$! a!!ociated 5ith an accidental e<po!ure of the data remain4 "ften ;u!t ma!$ing the
mo!t !en!itive information &credit card num/er!= cu!tomer email addre!!e! etc* i!
enough to !ome5hat mitigate the damage a!!ociated 5ith accidental e<po!ure and the
ma!$ed data/a!e! remain ;u!t a! functional4
1+ List !f Mas'ing Techni,ues
Substitution
The Su/!titution techni:ue replace! the e<i!ting data 5ith random value! from a
prepared data!et4
Shuffling
The Shuffling techni:ue u!e! the e<i!ting data a! it! o5n !u/!titution data!et and move!
the value! /et5een ro5! in !uch a 5a3 that no value! are pre!ent in their original ro5!4
Number and Date ariance
The 1um/er and Date #ariance techni:ue varie! the e<i!ting value! in a !pecified range
in order to o/fu!cate them4 .or e<ample= /irth date value! could /e changed 5ithin a
range of CD- 9) da3!4
Encr!ption
The Encr3ption techni:ue algorithmicall3 !cram/le! the data4 Thi! u!uall3 doe! not leave
the data loo$ing reali!tic and can !ometime! ma$e the data larger4
Nulling "ut "r Deletion
The 1ulling "ut techni:ue !impl3 remove! the !en!itive data /3 deleting it4
Mas#ing "ut
If t5o ta/le! contain the column! 5ith the !ame denormali@ed data value! and tho!e
column! are ma!$ed in one ta/le then the !econd ta/le 5ill need to /e updated 5ith the
change!4 Thi! techni:ue i! called Ta/le-To-Ta/le S3nchroni@ation4
Title: SIEBEL Data Migration Approach in Secured Environment Page 9 of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential
1- EIM &ith Mas'ed Data
6e can develop the code 5ith the ma!$ed data a! it i! done u!uall34 Since ma!$ing
techni:ue! maintain the functional appeareance 5e can u!e the defined EIM procedure!4
Good luck with your data masking in EIM. We hope this document will provide you with
some useful topics to consider. If you have any questions about the contents of this
document or data masking in general please do get in touch with us. We are happy to
provide advice and assistance.
Title: SIEBEL Data Migration Approach in Secured Environment Page 7 of 7 evi!ion: 1
"riginator: #ive$ %umar&'('11)* +onfidential La!t Save Date:),-.e/-')10
.ile 1ame:SIEBEL Data Migration Approach in 2ighl3 Secured Environment4pdf
TCS Confidential

Das könnte Ihnen auch gefallen