SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Testing Governance and Data Management The lie of the land: results of a survey conducted in May 2008 Jon Collins Freeform Dynamics Ltd +44 1285 771 433 [email_address] www.freeformdynamics.com
Agenda ,[object Object],[object Object],[object Object]
Thinking of your IT systems, how much does your organisation make use of the following? There’s plenty of custom application development going on
If you are using live data (e.g. from application databases), is this for any of the following reasons? Live data is a necessary part of the equation for a number of good reasons. The question is, though, how well is it controlled?
Is live data used during development or testing? (Those who knew) We are told by those that know, that live data is used in development and/or testing in almost three out of four organisations.
Knowledge of whether test data is used during the development or test cycle  “ Those that know”: Many of those in the business responsible for risk and compliance are unaware of how live data is used in IT
Sanitisation of data for use in development/testing  (Those who knew) About of third of organisations use data straight out of live systems, though many sanitise or anonymise data before use.
Who has primary responsibility for security policy in relation to application development and testing? The IT function is largely left to figure out and implement its own security policies in relation to application development and testing. The last bastion of the technical?
Security and the development cycle
How are your IT systems teams resourced? To begin with, we must understand who is involved, and it is clear that in the majority of cases, we need to consider external as well as internal staff.
Where does the majority of systems development and testing take place?  The physical location and distribution of development and testing activity adds another interesting dimension to the consideration of lifecycle security.
Considering implementing new systems or significant upgrades to existing systems, how usual is it for you to set up development, test and live environments in the following ways? Then there is the question of how much development, test and live environments are separated during the lifecycle.
Some of the risks we know about... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What priority do you give to improving the following aspects of your testing?  The top two areas of improvement are both directly relevant to the use of live data. Policy is unclear from a business perspective and poor data test data management indicates a big potential risk.
What priority do you give to improving test data management?  Ironically, those with more to lose (i.e. those using live data) are the ones who highlight the need for most improvement. This is no doubt in part due to a heightened awareness of the issues.
Where can we look for improvements? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Do policies exist to deal with the way in which information is used and accessed? A mix of policy is the best bet for organisations using sanitised data.
Is your organisation subject to a lot of regulation with regard to record keeping?  Note how “specific regulation” leads to higher use of sanitised data than more general regulation.
Is your organisation subject to a lot of regulation with regard to record keeping? (Priority given to improving test data management) Plus, more regulated organisations recognise the need to improve how they manage their test data.
How much do you agree or disagree with the following: ‘We have a single set of testing processes that we apply stringently to all of our testing’? Stringent application of testing process is more applicable in environments where data is sanitised
Turning specifically to software development and testing, which of the following statements fits your organisation? (Priority given to improving test data management) We can also see how important it is for business involvement to lead to test data management improvements.
What specific technical capabilities do you feel would make the most difference? Gaps in tooling that are consistent with the need for improvements in test data management and sanitisation of live data are clear.
What specific technical capabilities do you feel would make the most difference? Two thirds of those who use live data during test and development highlight the need for better tools to sanitise extracts.
Conclusions ,[object Object],[object Object],[object Object]
Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] © 2008 www.freeformdynamics.com

Weitere Àhnliche Inhalte

Was ist angesagt?

International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
CompTIA
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road map
IAEME Publication
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
clarkems
 

Was ist angesagt? (20)

Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Preparing for GDPR
Preparing for GDPRPreparing for GDPR
Preparing for GDPR
 
Transformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance worldTransformation of legacy landscape in the insurance world
Transformation of legacy landscape in the insurance world
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road map
 
Uop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-newUop hsa-520-midterm-part-2-new
Uop hsa-520-midterm-part-2-new
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Results deck pc refresh
Results deck pc refreshResults deck pc refresh
Results deck pc refresh
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015Qtility - Content Management Strategies 2015
Qtility - Content Management Strategies 2015
 
Observations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life SciencesObservations, Issues, Benefits: Mobility in Life Sciences
Observations, Issues, Benefits: Mobility in Life Sciences
 

Andere mochten auch

Governance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabsGovernance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabs
VIJAYA BHASKARA VARMA YARAKARAJU
 
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Global Human Ecodynamics Alliance
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introduction
Oana Feidi
 
Accenture Technology Vision 2012
Accenture Technology Vision 2012Accenture Technology Vision 2012
Accenture Technology Vision 2012
Lars Kamp
 

Andere mochten auch (15)

Governance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabsGovernance, Management And Testing In An Outsourced Model From AppLabs
Governance, Management And Testing In An Outsourced Model From AppLabs
 
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
Andrea Torvinen, Grant Snitker and Rhian Stotts (ASU) Testing the Application...
 
Test management
Test managementTest management
Test management
 
CMMi & IT Governance
CMMi & IT GovernanceCMMi & IT Governance
CMMi & IT Governance
 
The Art Of Testing Trading Platforms From AppLabs
The Art Of Testing Trading Platforms From AppLabsThe Art Of Testing Trading Platforms From AppLabs
The Art Of Testing Trading Platforms From AppLabs
 
Accenture: Bennet Harvey
Accenture: Bennet HarveyAccenture: Bennet Harvey
Accenture: Bennet Harvey
 
Software test management overview for managers
Software test management overview for managersSoftware test management overview for managers
Software test management overview for managers
 
Introduction to SIGMA
Introduction to SIGMAIntroduction to SIGMA
Introduction to SIGMA
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Accenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of businessAccenture DevOps: Delivering applications at the pace of business
Accenture DevOps: Delivering applications at the pace of business
 
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
DevOps and Continuous Delivery Reference Architectures (including Nexus and o...
 
Test Management introduction
Test Management introductionTest Management introduction
Test Management introduction
 
Agile Program and Portfolio Management
Agile Program and Portfolio ManagementAgile Program and Portfolio Management
Agile Program and Portfolio Management
 
Accenture Technology Vision 2012
Accenture Technology Vision 2012Accenture Technology Vision 2012
Accenture Technology Vision 2012
 
Introduction To Software Engineering
Introduction To Software EngineeringIntroduction To Software Engineering
Introduction To Software Engineering
 

Ähnlich wie Testing Governance And Data Management

MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
EvonCanales257
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Testing Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - WhitepaperTesting Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - Whitepaper
Ryan Dowd
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
Luke Arrington
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
TakishaPeck109
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
Splitty
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
joellemurphey
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
Chap001
Chap001Chap001
Chap001
rpvgb
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
cuddietheresa
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptx
OsamaRehman10
 
Responses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docxResponses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docx
audeleypearl
 

Ähnlich wie Testing Governance And Data Management (20)

MITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s NaMITS Advanced Research TechniquesResearch ProposalStudent’s Na
MITS Advanced Research TechniquesResearch ProposalStudent’s Na
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Testing Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - WhitepaperTesting Data & Data-Centric Applications - Whitepaper
Testing Data & Data-Centric Applications - Whitepaper
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Multidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data ManagementMultidimensional Challenges and the Impact of Test Data Management
Multidimensional Challenges and the Impact of Test Data Management
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
A Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdfA Detailed Guide To Test Data Management.pdf
A Detailed Guide To Test Data Management.pdf
 
Chap001
Chap001Chap001
Chap001
 
Documentation seminar
Documentation seminarDocumentation seminar
Documentation seminar
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptx
 
Responses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docxResponses to Other Students Respond to 2 of your fellow classmate.docx
Responses to Other Students Respond to 2 of your fellow classmate.docx
 
Turkey Software Qualıty Report
Turkey Software Qualıty ReportTurkey Software Qualıty Report
Turkey Software Qualıty Report
 

Mehr von Jon Collins

It looking forward
It looking forwardIt looking forward
It looking forward
Jon Collins
 

Mehr von Jon Collins (15)

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobile
 
Securing the Un-securable?
Securing the Un-securable?Securing the Un-securable?
Securing the Un-securable?
 
It looking forward
It looking forwardIt looking forward
It looking forward
 
Driving value from IT
Driving value from ITDriving value from IT
Driving value from IT
 
IT Support and workforce productivity
IT Support and workforce productivityIT Support and workforce productivity
IT Support and workforce productivity
 
We’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAWe’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOA
 
Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to reality
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensing
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business Intelligence
 
Threats And Countermeasures
Threats And CountermeasuresThreats And Countermeasures
Threats And Countermeasures
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology Garden
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual Worlds
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

KĂŒrzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Testing Governance And Data Management

  • 1. Testing Governance and Data Management The lie of the land: results of a survey conducted in May 2008 Jon Collins Freeform Dynamics Ltd +44 1285 771 433 [email_address] www.freeformdynamics.com
  • 2.
  • 3. Thinking of your IT systems, how much does your organisation make use of the following? There’s plenty of custom application development going on
  • 4. If you are using live data (e.g. from application databases), is this for any of the following reasons? Live data is a necessary part of the equation for a number of good reasons. The question is, though, how well is it controlled?
  • 5. Is live data used during development or testing? (Those who knew) We are told by those that know, that live data is used in development and/or testing in almost three out of four organisations.
  • 6. Knowledge of whether test data is used during the development or test cycle “ Those that know”: Many of those in the business responsible for risk and compliance are unaware of how live data is used in IT
  • 7. Sanitisation of data for use in development/testing (Those who knew) About of third of organisations use data straight out of live systems, though many sanitise or anonymise data before use.
  • 8. Who has primary responsibility for security policy in relation to application development and testing? The IT function is largely left to figure out and implement its own security policies in relation to application development and testing. The last bastion of the technical?
  • 9. Security and the development cycle
  • 10. How are your IT systems teams resourced? To begin with, we must understand who is involved, and it is clear that in the majority of cases, we need to consider external as well as internal staff.
  • 11. Where does the majority of systems development and testing take place? The physical location and distribution of development and testing activity adds another interesting dimension to the consideration of lifecycle security.
  • 12. Considering implementing new systems or significant upgrades to existing systems, how usual is it for you to set up development, test and live environments in the following ways? Then there is the question of how much development, test and live environments are separated during the lifecycle.
  • 13.
  • 14. What priority do you give to improving the following aspects of your testing? The top two areas of improvement are both directly relevant to the use of live data. Policy is unclear from a business perspective and poor data test data management indicates a big potential risk.
  • 15. What priority do you give to improving test data management? Ironically, those with more to lose (i.e. those using live data) are the ones who highlight the need for most improvement. This is no doubt in part due to a heightened awareness of the issues.
  • 16.
  • 17. Do policies exist to deal with the way in which information is used and accessed? A mix of policy is the best bet for organisations using sanitised data.
  • 18. Is your organisation subject to a lot of regulation with regard to record keeping? Note how “specific regulation” leads to higher use of sanitised data than more general regulation.
  • 19. Is your organisation subject to a lot of regulation with regard to record keeping? (Priority given to improving test data management) Plus, more regulated organisations recognise the need to improve how they manage their test data.
  • 20. How much do you agree or disagree with the following: ‘We have a single set of testing processes that we apply stringently to all of our testing’? Stringent application of testing process is more applicable in environments where data is sanitised
  • 21. Turning specifically to software development and testing, which of the following statements fits your organisation? (Priority given to improving test data management) We can also see how important it is for business involvement to lead to test data management improvements.
  • 22. What specific technical capabilities do you feel would make the most difference? Gaps in tooling that are consistent with the need for improvements in test data management and sanitisation of live data are clear.
  • 23. What specific technical capabilities do you feel would make the most difference? Two thirds of those who use live data during test and development highlight the need for better tools to sanitise extracts.
  • 24.
  • 25. Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] © 2008 www.freeformdynamics.com