Data protection in the cloud: data masking from PII

Data protection in the cloud: data masking from PII

Share post

Data protection in the cloud: with the data masking of PII in file storage such as S3, Azure BLOB and Google Cloud Platform (GCP). The personal data contained therein is found first and masked via an API call.

The popularity of cloud storage: As more and more data processing moves to the cloud, so does storage. This is only logical, because cloud systems need to be close to the data in order to be efficient, just as the data on the local computers should be stored on or nearby for faster processing.

Data storage in the cloud is convenient

One reason why data storage in the cloud is so popular is that purchasing and maintaining storage devices on site is a headache. Cloud providers allow companies of all sizes to store data outside of the company, regardless of whether that data is connected to other cloud services or applications or not.

Encryption of cloud storage: The providers of cloud storage services usually offer two forms of encryption, during transmission (dynamic) or at rest (static).

Important security issues

Does the protection offered by cloud storage service providers guarantee that your sensitive data will not be exposed? Even with encryption in transit and at rest, there are still ways for criminals to access your sensitive data stored in the cloud. According to Cypress Data Defense, the most common security risks in the cloud include unauthorized access through improper access controls and misuse of employee data.”

Inappropriate actions and behaviors by corporate employees are a risk to be considered in any industry. It's pretty easy to understand that an attacker coming from within doesn't have to worry about security when accessing data in the cloud.

Fast and secure data masking

IRI DarkShield is a data masking tool for finding and de-identifying sensitive data in semi-structured and unstructured files and databases. DarkShield is one of the three core data masking products in the IRI Data Protector Suite that can leverage graphical data classification, search and masking job design models in the Eclipse-based IRI Workbench IDE.

To find and protect sensitive data in a variety of sources, the DarkShield APIs use specified search matches and masking rules that follow business rules.

Amazon S3, Google Cloud, MS Azure and the DarkShield Files API

There are several competitors in the cloud market for the storage of files, commonly known as BLOBs (Binary Large Object Blocks). The focus of this article is on the three most popular cloud storage service providers: Amazon S3, Google Cloud Storage, and Microsoft Azure Storage, and how the DarkShield-Files API can be used with these public silos.

Previously, IRI DarkShield could only find and mask PII in local file systems. However, with the latest version, DarkShield users can now add another important, targeted layer of data protection to the standard security measures provided by cloud storage providers. This article demonstrates how the DarkShield-Files API can access, search, and mask PII BLOBs in the cloud.

More at JET-software.com

 


Via JET software

JET-Software has been developing and selling data processing software for common operating systems such as BS1986 / OSD, z / OS, z / VSE, UNIX & Derivatives, Linux and Windows since 2000. We support over 20.000 installations worldwide. Our long-standing references include German federal and state authorities, social and private insurance companies, state, private and large banks, national and international service providers, medium-sized companies and large companies.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more