Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Monday, November 16, 2020

Not just during Covid-19: Time for data masking

Facial data mask

If you follow common sense or health agency / government instructions, you probably wear at least a basic face mask when mingling with other people. Mostly, this is to protect others from your droplets, possibly with some virus-laden payload. If the mask is more advanced, it is capably of filtering out stuff that may harm you.

Similar to face mask, data masks have been around for a long time. Data masks and face masks share the same purpose, preventing leakage of damaging "tiny bits". In the database system Db2, data masking is already built-in. You only need to apply data masking by defining masks (styling and sewing your own mask) and enabling them (putting it own). Here is how.

Thursday, January 31, 2019

Enterprise digitalization and cybersecurity: How companies struggle

Cybersecurity Workshop at Zeppelin University
Last Friday, 25.01.2019, I attended the Cybersecurity workshop of the "Bodensee Innovationscluster Digitaler Wandel" (digitalization). The innovation cluster is organized by the Zeppelin University in Friedrichshafen. It tries to bring together companies from the wider Lake Constance region that are impacted by digitalization. The researchers have identified four topics that will be addressed:

Monday, January 21, 2019

Hello again, Davos, AI ethics, cybersecurity, Db2 events and IBM Cloud

Hello, here I am again after a while. I hope you had a good start into 2019. I enjoyed being offline for a while, then got busy with not much time to blog. So, here is a roundup of things going on.

Saturday, November 11, 2017

Latest News on Bluemix and IBM Cloud

IBM Cloud News
Sometimes it's quite hard to keep an overview of what is going on with the IBM Cloud. I had been out on vacation and needed to catch up. Want to learn with me? Here is some of the latest news for Bluemix and IBM Cloud for some weekend reading:
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.

Thursday, February 23, 2017

Location and Intent Matter: Data Privacy vs. US Government

Data is locked away from the US authorities
Some data is locked away
Earlier this month and last Summer two interesting cases related to data privacy were decided. Both concern US search warrants for email data stored outside the United States of America. In July 2016 the United States Court of Appeals for the Second Circuit ruled that Microsoft does not need to hand over email data stored in Ireland. This February, the United States District Court for the Eastern District of Pennsylvania decided that Google must produce the emails which were stored outside the USA. The last case is not finally decided because Google plans to appeal the ruling. Independent of that, what is the take-away from these rulings? Let's take a look.

Friday, February 17, 2017

Carnival: Even DB2 Wears a Mask (Database Security)

Word cloud for data privacy and security
Data Privacy and Security
Right now we are in the hot phase of the carnival season. Many people are wearing masks. Some move into other characters, some just hide their real identity. Did you know that DB2 is also in the mood for carnival and wears a mask? Here is what my DB2 is doing these days...


Monday, April 11, 2016

Data Protection, Privacy, Security and the Cloud

Protecting your bits

(This is the first post in a planned series on data protection, security, and privacy related to DB2/dashDB in the cloud and IBM Bluemix)

As a data/database guy from Germany, security and data protection and privacy have been high on my list of interests for many, many years. As a banking customer I would hate it when someone not authorized would access my data. I also don't like to go through the hassle of replacing credit cards, changing passwords, take up a new name (user name only :), or more because a system my data is or was on had been hacked. With more and more data being processed "in the cloud" it is great to know how much effort has been put into designing secure cloud computing platforms, into operating them according to highest security standards, and how international and local data protection standards and laws are followed for legal compliance.

Thursday, April 2, 2015

db2audit & syslog: Who Stole my Chocolate Easter Eggs?

Security Audit
Easter is coming up, a slow day due to vacation and Spring Break, time to try out some, in advance, of the chocolate Easter eggs. Gosh! They are gone! Who took them? It must have been someone with insight. Let's take a look at the audit logs...

When the DB2 10.5 Cancun Release (Fixpack 4) was announced I mentioned that db2audit records can be transferred to syslog now and I wanted to test it. The command db2audit is used to configure parts of the DB2 audit infrastructure, to archive audit logs, and to extract information from the archived logs. The "extract" option now features a destination "syslog" (from the command syntax):

Audit Extraction

   .-file--output-file---------------------------------------------------.   
|--+---------------------------------------------------------------------+-->
   +-delasc--+---------------------------+--+-----------------+----------+   
   |         '-delimiter--load-delimiter-'  '-to--delasc-path-'          |   
   '-syslog--facility.priority--+-----------+--+-----------------------+-'   
                                '-tag--word-'  '-splitrecordsize--byte-'     

While the option "file" would store the formatted audit logs in a regular text file, choosing "delasc" would split the log data across several delimited text files, ready for postprocessing in the database. The new option "syslog" can be used to hand over the audit data to the system logger facility. Depending which logger is used and how it is set up it could mean storing the audit records in local message files or sending them over to a central hub for analysis (e.g., by IBM Operations Analytics or Splunk).


DB2 Setup
In order to find the one trying to steal the Easter eggs the audit system would need to be active prior to any attempt. The DB2 audit infrastructure is started with "db2audit start", basic settings can be changed with "db2audit configure". For my tests I left everything set to failure-only logging and changed the archive path to "/tmp". Using the "describe" option, here is how the configuration looked like:


[hloeser@mymachine ~]$ db2audit describe
DB2 AUDIT SETTINGS:

Audit active: "TRUE "
Log audit events: "FAILURE"
Log checking events: "FAILURE"
Log object maintenance events: "FAILURE"
Log security maintenance events: "FAILURE"
Log system administrator events: "FAILURE"
Log validate events: "FAILURE"
Log context events: "FAILURE"
Return SQLCA on audit error: "FALSE "
Audit Data Path: ""
Audit Archive Path: "/tmp/"


It is also a good idea to use a buffer to hold audit records. The audit_buf_sz controls its size:
db2 update dbm cfg using audit_buf_sz 40

The next step in my setup was to create an audit policy in my test database:
create audit policy execfail categories execute status failure,checking status failure, context status failure error type normal

Creating a policy does not mean it is used. The AUDIT statement takes care of it:
audit sysadm,dbadm,dataaccess,user hloeser using policy execfail

Syslog Setup
The above concludes the DB2 portion of the test setup. Next is the optional step of telling the system logger where to place the received DB2 audit data. The DB2 Knowledge Center has some basic information about how to configure the system error and event log (syslog). Without any changes it is possible to dump the audit data to, e.g., "/var/log/messages". I wanted the records go to a separate file. Because my system has rsyslog installed, I needed to edit (as root) the file "/etc/rsyslog.conf". Adding the following line causes all "user"-related records to be written to "user_messages.log" in the directory "/var/log/db2":

user.*                            /var/log/db2/user_messages.log

It is important to create that directory and file (I used "mkdir" and "touch"), then to restart the syslog facility.


DB2 Audit Logs to Syslog
Once done with the setup I connected to my test database and executed several SQL statements, including a "select * from eastereggs" (a non-existing table). Then I deemed my system ready for moving a first batch of audit records over to syslog. If a buffer for the DB2 audit data is used, it needs to be flushed:
db2audit flush

Thereafter, all the current audit logs need to be archived. This can be done for both the instance and for databases. The following archives the logs for my test database and writes the file to the configured archive path (or the default path if none is specified):
db2audit archive database hltest

After all the configuration and preparation, we are finally at the really interesting part, the new extract option. Using "syslog" as destination and the category "user" with the priority level "info", the audit logs are handed over to the system error and event logger:
db2audit extract syslog user.info from files /tmp/db2audit.*

Did the logs really make its way over from DB2 to the system infrastructure? Here is my successful test:
[hloeser@mymachine ~]$ sudo grep -i easter /var/log/db2/user_messages.log Apr  2 13:32:10 mymachine db2audit: timestamp=2015-04-02-13.31.09.089507; category=CONTEXT; audit event=PREPARE; event correlator=40; database=HLTEST; userid=hloeser; authid=HLOESER; application id=*LOCAL.hloeser.150402095529; application name=db2bp; package schema=NULLID; package name=SQLC2K26; package section=201; text=select * from eastereggs; local transaction id=0x3266020000000000; global transaction id=0x0000000000000000000000000000000000000000; instance name=hloeser; hostname=mymachine;

Happy Easter and hopefully some chocolate eggs are left for you!

Thursday, December 18, 2014

Data and 2014: Security and privacy

some bits
With security and privacy being one of the top topics for data processing in this year (and probably the next year too), I wanted my last post for this year to be spot on. Here is some input for DB2, dashDB, or the SQLDB service on Bluemix, the output is for you:


values(decrypt_char(cast (x'08D030FFB804A5D560F6F794046C11F329C9004B80EC3159' as varchar(50) for bit data),'santaclaus'));

BTW: This is not a quiz... :)

Friday, January 24, 2014

Security and DB2 LUW

Did you recently start paying more attention to credit card bills? Thinking twice before speaking on the phone or sending a text message? Cutting short on communication with your partner...? Awareness for topics such as privacy and data security has increased dramatically over the past few months. In some industries such as banking, the supervisory authorities - in Germany it is BaFin - have tightened regulations over several years, requiring changes to how databases are set up and administrated, how data can be stored and accessed. As I recently declared 2014 as the year of database security, I thought collecting some related DB2 resources would be a good way to promote it. Here we go...

When you work with DB2 for Linux, UNIX, and Windows, and are researching a topic, then the DB2 Information Center is a good start. It has an entire section on security (look at the navigation section on the left). It explains the DB2 Security Model, various security-related concepts, and has links and background information on some IBM InfoSphere Guardium tools. Many security and auditing tools as well as the Data Encryption (formerly Encryption Expert) product are labeled Guardium.

Other places to visit are the DB2 Best Practices, IBM Redbooks, and IBM developerWorks (list of DB2 security articles). There is a IBM Data Server Security best practices paper and also a redbook "DB2 Security and Compliance Solutions for Linux, UNIX, and Windows". You can also learn about security functionality when attending one of the offered Information Management bootcamps or taking a DB2 class through Learning Services.

Last but least, before I start my weekend, I would like to point to the blog articles I have written on DB2 security topics.

Have a nice weekend and watch your transactions...

Wednesday, September 25, 2013

xkcd comic: Opinions on Internet Privacy - what to add?

xkcd has a nice comic about different opinions on Internet Privacy. They are all good and valid, but are missing opinions of those who really care about data: Us. So what would be a panel or frame you what like to add to that comic..?

Let me add this one: The IT-conscious meteorologist - "This must be real, there are no clouds in Utah".

Wednesday, June 26, 2013

Combining data to find suspect in over 700 highway shootings

In Germany a 57-year-old trucker was arrested over the weekend. He is accused of shooting over 700 times at trucks (mostly car transporters) and cars over a span of several years. Only few people got injured as this were drive-by shootings on highways and he was aiming at the load, not the drivers. As the case couldn't be resolved for some years it eventually up with German federal police. They used new devices to automatically collect license plate information at central highway locations plus cell tower data from mobile phones to drill down on the suspect.

As soon as the arrest was reported, a discussion about data privacy started in Germany (again). Is it ok to store all the license plate information, even if it was deleted after 10 days? Does a case like this warrant to obtain cell tower information (who had their mobile phone turned on around possible shooting locations and traveling on the highway)? Was it ok to combine the data to find the suspect? There are pros and cons to it and I don't want to comment in either direction. When I teach data management at university I tell my students to be aware of the amount of data they produce, e.g., by having a mobile phone, by traveling, by using the Internet. Such data is stored for billing purposes and for legal reasons (laws that require companies to keep data for 30 or 90 days or even longer). And when there is data, there is always an opportunity to work with it, legally or illegally.

Are you in favor of using such data, maybe within certain limits? Are you always aware of what data you produce? Any opinions or thoughts?

Wednesday, May 15, 2013

Optim Query Capture and Replay for system tests

One of the frequent questions during bootcamps is about what tools are available for performing tests, especially driving workloads against a DB2 database. In an older article I pointed you to the Workload Multiuser Driver (WMD) and to the TPoX-included workload driver, both free, open source, and from IBM-initiated projects. Today, I wanted to point you to a tool that is a spin-off of InfoSphere Guardium, the so-called InfoSphere Optim Query Capture and Replay (OQCR).

What the tool does is simple to describe. It captures (or logs) the workload or traffic to one database and is then able to replay it to a different system, i.e., to send the queries it grabbed to a database. That way it is possible to test out systems under realistic "stress" before putting them into production. Optim Query Capture and Replay is able to manage workloads. With that statements or transactions can be removed from a workload or they can be copied into others. Users and schemas can be mapped, the speed of how quickly workloads or queries are replayed can be changed and much more.

The best way to learn more about Optim Query Capture and Replay is to either start with the OQCR Information Center or by glimpsing over the documents available at the so-called information roadmap. The tool can also be used together with the Optim Test Data Management solution which allows cloning of production databases for tests, including applying or handling data privacy rules (masking data).

Monday, February 15, 2010

Google Buzz educates public about data privacy

I had written about the Data Privacy Day on January 28th. One of the big corporate sponsors is (any guesses?): Google. Quoting from Wikipedia:
Data Privacy Day's educational initiative has focused on raising awareness among teens and young adults about the importance of protecting the privacy of their personal information online, particularly in the context of social networking.
It turns out that with the introduction of Google Buzz, Google itself created a lot of awareness in the public how important it is to protect privacy of personal information. To me this brought up again one of  fundamental rules of online activities:

Do not trust anybody, not even a service provider.

Before using an online service it is important to look at the risks vs. convenience. How will I use a service, what data could be possibly be exposed? The latter is about the worst case. It is about what happens when there is a leak, a change in policies, or other problems, not about the terms of use accepted when signing up. Do I trust that company? And then we are back to the fundamental rule...

Thursday, February 11, 2010

Bank Data R Us (not anymore)

The European Parliament voted down a temporary agreement that allowed US agencies to access information on bank transfers of EU citizens. Strong privacy concerns were the driving motivation behind the parliaments decision to stop the data access.

The decision is interesting for EU citizens in several aspects: One is the strong emphasize on data privacy and data protection, the second one is that the EU parliament made use of its veto powers and shot down a decision of the EU council, indicating that it cannot be ignored in the future.

(For those not living in the EU, here is more background on the EU Parliament. The members are directly elected by the EU citizens.)

Thursday, January 28, 2010

Today is Data Privacy Day

Maybe, you didn't know that today is Data Privacy Day. I didn't know before, but it is an important day. With more and more data created, especially personal and behavioral data, it's important to think about how and where YOUR data is handled and by whom. When I sign up for a service or order something online, I usually take at least a quick look at the fineprint in the terms & conditions. The same is true when I sign papers (and I have been annoying people for taking my time to read the fineprint).

What do you do? Do you look at how companies handle your data (or at least what they promise they will do)? Do you let companies know when you are concerned with their policies? If you are in data management (and most of my readers seem to be), how do you treat the data you are in charge of? How is your company handling data?

I tell students that data and information is one of a company's most valuable assets. And that's how you have to treat it. Customers trust a business partner to treat the data with care and that's some trust that can be lost very quickly if policies are violated or changed to the worse, if companies do not invest in their employees and the right technologies.

BTW: The only way for me to identify who is reading my blog is through you posting comments and leaving your name.

Monday, January 25, 2010

What our dishwasher knows about my family

End of last year our dishwasher suddenly "behaved". An error message was on its display and the water pump was running continuously. Pressing the OFF button didn't change anything. After consulting the user manual, we followed the suggested 2-step approach:

0.) (Don't panic)
1.) Shut off the fuse switch if you are sure there is no water damage.
2.) Call the service.

We were lucky to have the manufacturer service in our house already the next afternoon. Instead of opening the dishwasher, a suction cup with an inductive reader got attached to the machine's control panel. A second later the first data appeared on the technician's ThinkPad (yes) and I heard "above average usage". The dishwasher had been sniffing into our family life and was able to report its hours of duty and some details. Combined with the purchase date this gave an impression of how often it is used per day.

This got me thinking. What other of the electric household appliances are spying on us? If someone is reading out all of them, what picture would that give? What machine would be my biggest enemy? Let me know your machines and what data they can collect.


BTW: The service visit was free of charge and the dishwasher is running better than ever.

Thursday, December 17, 2009

Orwell, 1984, and Google

Forbes has an interesting article "When Google Runs Your Life". Basically, Google is on its way to impact (control? profile?) most of your private and corporate life. It has its reach into search, mapping and navigation, online and offline applications, into communication (both landlines and mobile). Through its browser and operating systems as well as DNS services it is also at the door to the Internet. To top that, by way of the AdSense and Analytics services there is a web of checkpoints plastering the Information Highway and more.

You talked with someone or left a message? You transcribed and analyzed it. You got emails? Analyzed and only the advertising got optimized. You surfed to some fancy places? Google already got the big picture of your personality.

In the article Eric Schmidt, Google's CEO, is cited as:
Privately, however, he has told friends to keep off a computer anything they want to keep private.
In several European countries there are already discussions about Google and compliance with privacy laws. It will be interesting to see how this moves forward.

Wednesday, December 9, 2009

Holiday Preparations - Your action required!

I recently wrote about how companies make use of their address data during the last weeks of the year. Today, I thought to join the **fun** of ongoing holiday activities and start my own giveaway/sweepstakes. I will be crowning my "Reader of the Year" later this month. To be eligible, you don't have to submit silly forms, post holiday videos to YouTube, solve puzzles like "December is the ____ month of the year" or get your kids to paint your family.

All I am asking is that you leave some basic information, similar to other sweepstakes. Please comment on this post, with your name, your full address, your birthday, your annual income (full dollars/Euros/etc. is ok), your occupation, your detailed family status, and your highest degree of IT certification (no school information required!).

P.S.: And remember the fun part.

Thursday, November 5, 2009

How much does Google know (officially)?

Earlier this week I asked "How much data do I generate?", now I saw that Google is adding another service, the "Google account dashboard", that let's you see what Google is knowing about you. Supposedly.

It's interesting to see statistics about your account activities in one place. The interesting question is how do you interpret, how do you analyze it (from Google's perspective)? What does Google really know (or guess) about me? The question is not Google-specific, but applies to all those companies that collect data about you.

It is good to see such a feature in place because it creates more awareness of the data privacy/data collection issue. I would like to see similar services by other companies.