Maxim Penkov sees potential difficulties in implementing depersonalization

Learn, share, and connect around europe dataset solutions.
Post Reply
tanjimajuha20
Posts: 553
Joined: Thu Jan 02, 2025 7:17 am

Maxim Penkov sees potential difficulties in implementing depersonalization

Post by tanjimajuha20 »

"These technologies are very effective: they do not simply limit access to data, but allow you to reduce the attack surface by tens of times by replacing all sensitive information with anonymous information in all copies of the product. That is, even if a copy leaks, it is not scary, it no longer contains the original data," Ali Gadzhiev is sure. "Of course, at first, you will need to configure the solution and integrate it into the processes of continuous integration and deployment of software (CI/CD), which will slow down the processes of releasing developed products into productive operation, but a high-quality masking system will help automate the preparation of test data and reduce Time2Market after the first year of use."

Alexander Bykov, Head of Security Services at Nubes cloud provider, warns that the effectiveness of masking technologies is achieved when certain conditions are met: "Data depersonalization technologies are certainly effective. However, it is important to set up the appropriate solutions correctly. They must be nepal whatsapp number database configured in such a way that masked data, if leaked, cannot become the key to compromising real data. It is also worth keeping in mind that the use of masking can reduce the convenience of integrating new information systems, as well as complicate the transfer of data from one system to another within the company or when transferring to partner systems. In addition, depersonalization and restoration of original data additionally loads the information system, but usually this does not complicate the work."

Alexander Cherny reminds that the convenience and speed of masking technologies greatly depend on the method used: "Roskomnadzor in its methodological recommendations defined four methods of depersonalizing personal data (PD): the method of introducing identifiers, the method of changing the composition or semantics, the decomposition method and the mixing method. Each of them provides its own set of properties of depersonalized PD, for example, completeness, structuring, anonymity, etc. Thus, depending on the task at hand, an organization, by determining the final properties of depersonalized PD it needs, can choose the appropriate and most effective depersonalization method for performing this task."

Alexey Obukhov called the technologies very effective, including against many deanonymization technologies that skeptics refer to. But he also noted that the use of masking technologies can be inconvenient, especially for developers, since it distorts test data due to the fact that real data can be replaced with identical symbols.

"The main disadvantage of depersonalization is that it is extremely difficult to "stitch" data obtained from different sources. Moreover, as a result, a number of valuable data are unsuitable for further analysis. And this problem concerns not only retail and mass services, but also socially significant areas - for example, medicine," the press service of Angara Security commented on the potential difficulties in using data masking technologies.
in the fact that changes are required in the business processes of companies and established work algorithms: "The difficulty lies in the fact that the implementation of data depersonalization tools requires changes in established business processes. As a rule, companies that have approached vendors with a corresponding request are not ready for fundamental changes in existing work algorithms, thereby slowing down the achievement of the original goals."
Post Reply