17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1 – Understanding Sensitive DataThe PCI DSS recognizes this dynamic when it states that the cardholder'sname, service code and expiration date are required to be protected when it isstored in conjunction with the primary account number (PAN). Otherwiseemploying protection methods for the cardholder's name, service code andexpiration date are optional for compliance with PCI DSS.When reviewing a database for the consideration of applying protectionmethods, and implementing access controls, keep this dynamic in mind.Additional protection, abstraction and obfuscation methods may be requiredeven if the columns involved have been assigned a low or medium sensitivityclass. Some solutions for reducing the sensitive group dynamic might include:• Careful consideration of the data that is being captured in thedatabase. For example, it is not uncommon to capture the full name ofan individual in a database. However, there may be times when the lastname, or initials, are all that are required for the purpose of the system.• Capturing only a portion of personal data. For example, storingonly the birth year portion of a birth date. Another option might be tocapture the birth date in an obscure format such as Julian date. Forexample, the date of 06/03/2009 00:00:00.000 is the Julian date of2454985.50000.• Applying a one-way hash to personal information such as mother'smaiden name. By doing so the value will never be readable in plaintext and yet the ability to compare an entered value remains. This willbe covered in more detail in Chapter 7 of this book.Data at Rest and Data in TransitData at rest refers to data that is stored, archived or residing on backup media.Data in transit refers to data that is traversing a network, or residing in memory.Both states of data have their security concerns and methods of threatmitigation.The PCI DSS is a good example of an industry standard that presents therequirements of securing sensitive data differently for data at rest and data intransit. Requirement 3 of the PCI DSS focuses on data storage, access control,and readability of sensitive data while in storage, as well as encryption keymanagement. These techniques are focused on data at rest. Requirement 4 ofthe PCI DSS focuses on the use of security protocols, wireless networks andencryption, which are focused on data in transit.When considering protection methods, keep in mind that many methods thatare designed to protect data at rest are not necessarily sufficient for data in33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!