By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Protect your organisation’s crown jewels: Production data
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Protect your organisation’s crown jewels: Production data
CybersecurityEnterpriseSoftware

Protect your organisation’s crown jewels: Production data

Techgoondu
Last updated: December 22, 2022 at 4:51 PM
Techgoondu
Published: December 22, 2022
5 Min Read

Brought to you by SolarWinds

By Thomas LaRock, Head Geek at SolarWinds

The British Royal Family safeguards its Crown Jewels—the treasures held by the English monarchy comprising more than 100 objects estimated to be worth billions—with world-class security systems, including two-ton steel doors and bomb-proof glass.

When the Crown Jewels are transported or moved, such as for a royal wedding or the recent coronation ceremony, they are guarded closely by elite, ex-military members at all times, with access restricted to only a few security-cleared individuals.

These anecdotes do not convey a love for The Royal Family but rather illustrate that security and access to the Crown Jewels is an immediate and constant concern. The same needs to be true for your organisation’s “crown jewels”—the production data enabling you to conduct your mission-critical day-to-day business tasks and processes, including the core applications that the business uses daily.

In many cases, organisations will typically create staging environments enabling developer teams to write code and run tests to ensure the applications they ship are high quality before deploying them to customers. However, these test environments can present risks when organisations use their “crown jewel” production data in them.

Real-world data containing customer information—such as Social Security numbers, financial information, addresses, and more—or other proprietary data is core to how a business operates. Using this production data in test environments unnecessarily exposes it to new risks of being transferred, stolen, or exposed. If we were to use the royal treasure analogy again, this would be like allowing a mall security guard to move the Crown Jewels from one location to another.

So what is the most effective way to avoid the risk of exposing your critical data while still being able to build high-quality applications effectively?

By using dummy data, dummy.

A company should rarely need to use real production data to develop applications. Instead, they simply need to use information that looks, acts, and is processed like production data. Dummy data is safer because it eliminates the risk of customer information being inappropriately accessed.

One of the most common ways companies obtain dummy data for use in their testing environment is through test data generator services or API mocking tools. These services automatically create information you can use in your test environments.

And while that sounds easy, there is usually a cost associated, and you will still need to manually create and input a sample data set for the generator to work.

If you are interested in creating dummy data in-house, there are also methods for companies to simulate statistics in their databases to generate this type of data. By manually inputting fake information into empty databases (a primer on how to create statistics designed to inform dummy data here) in your system, you can generate your data for use in test environments.

Unfortunately, using production data in staging environments is still common because it is easier and less expensive than creating this dummy data. Because production data is often considered an organisation’s most important asset, it can be shocking when security-forward firms still choose to use production data in test environments.

Despite all the warnings and enterprise security risks, your organisation may still need production data to build an application at the lowest cost and in the shortest timeframe.

Should you absolutely need to transfer and use production data in its test environments, there are a handful of best practices to consider. The first is leveraging industry-recommended data encryption. When considering the best method to use, many organisations turn to the National Institute of Standards and Technology (NIST)-approved Format-Preserving Encryption to de-identify their production data.

Alternatively, obfuscating or masking data is another technique that organisations should consider. The process creates data that is structurally similar, but that is not the same as the original data. While the goal of data masking or obfuscation is to create a version of the original information that cannot be deciphered or reverse-engineered, risk, though slim, does still exist.

It’s critical to reduce the risk of exposing production data whenever possible. The potential consequences of not doing so are too great.

Microsoft partners team up on Red Dot ERP
Singapore government pushes for more ‘open data’ usage with app competition
Robots make last-mile deliveries in Singapore, in FedEx-QuikBot tie-up
Dell unveils “spam filter for the cloud”
Healthcare data is prime target in cyberattacks: Rubrik
TAGGED:API mockingcybersecurityNISTproduction datasoftware developmentsolarwinds

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Aftershock opens flagship store at Suntec City, showcasing custom gaming PCs
Next Article Applied Materials to open S$600 million factory in Singapore, doubling manufacturing footprint
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Nothing Phone (3) review: Flagship-lite alternative to costly top-end models
Cellphones Mobile
August 25, 2025
A decade in, Google Pixel 10 phones bank hard on AI to retain niche
Cellphones Mobile
August 22, 2025
Microsoft Surface Pro (12-inch) review: Compact, versatile 2-in-1 gadget for the road
PC
August 21, 2025
Ensign InfoSecurity to train 1,000 Singapore board directors in cybersecurity response
Cybersecurity Enterprise
August 19, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?