ISO/IEC 27001 Control 8.11: Data masking

Control

Data masking should be used in accordance with the organization’s topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.

Necessity of MidPoint

MidPoint is optional for implementation of this control.

Implementation of this control without midPoint is feasible. However, midPoint provides considerable advantages for implementation of this control, making the implementation more efficient and reliable.

Implementation Overview

Provisioning flexibility of midPoint can be used to provide some data masking capabilities.

Implementation Details

MidPoint contains very flexible provisioning engine at its core. Mappings and expressions supported by the engine can be used to mask data when midPoint provisions the data to target systems. Projection links are used to keep track of the data. Persona functionality could be used to create consistent masked data across several systems. Mappings can be used to select data elements to provision to target systems, minimizing the set of data stored in external systems. Similarly, authorization mechanism can be used to limit access to sensitive data in midPoint repository and user interface.

Implementation Notes

  • Pseudonymity and anonymity and very hard to achieve. As the usual purpose of data masking is to maintain some structure of original data, som data leaks (de-anonymization) are likely. Therefore we recommend not to rely on data masking as the only protection mechanism, use it only as a supplementary mechanism. Protect your development and test environments accordingly using access control techniques.

  • MidPoint has a built-in mechanism for exporting anonymized data for the purposes of data mining research.

Rationale

While midPoint does not have off-the-shelf support for data masking, similar results can be achieved by using mappings and expressions.

Was this page helpful?
YES NO
Thanks for your feedback