Save or Share this Report

For Application Development & Delivery Professionals

Test Data Privacy Is Critical To Meet Compliances

Data Masking Can Help Protect Test Data

October 13, 2009

Primary author headshot


Why Read This Report

Using customer, employee, or other confidential data straight from production for testing or developing applications violates data privacy laws and regulations and makes that data a soft target for attacks. Data privacy is not just a concern for production systems; it extends to nonproduction environments, too, including test, development, quality assurance (QA), staging, and training databases — wherever private data resides. Although many database administrators (DBAs) and security and risk professionals are revisiting security policies for test data, most still are not securing such data. All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).


Table of Contents

  • Test Data Privacy Often Gets Lower Priority Despite Exposing Private Data
  • Data Masking And Data Generation Can Help Protect Private Data
  • Ten Steps To A Successful Data Masking Initiative
  • The Data Masking Vendor Landscape Is Growing But Also Consolidating

  • Data Masking Should Be Part Of Your Enterprise Data Security Strategy
  • Related Research Documents

Recommended Research