The following information is an example of a simple security rules configuration.
Create a security rule set so that you can append the two security rules. The security rules that you create log, identify, and rewrite SQL requests that an application or a client issues to the Data Vault.
Create a rule that logs every incoming request to the security rule set. When the rule engine applies this rule, the resulting information appears in the Dynamic Data Masking
rule.log
file. Use the rule to identify incoming requests that cause the audit to fail. For more information about the
rule.log
file, see the
Informatica Dynamic Data Masking Administrator Guide
.
Create a rule that identifies specific strings of text in the SQL requests that an application or a client issues to the Data Vault. Then, the Rule Engine rewrites the SQL statement to append the
AUDIT USING
and
FROM RESULTSET
tags.
After the Dynamic Data Masking Rule Engine identifies a match and rewrites the SQL statement to append the
AUDIT USING
and
FROM RESULTSET
tags, it sends the rewritten request to the Data Vault. The Data Vault server recognizes the
AUDIT USING
tag and writes the results of the audit to the audit log file. The audit log file is located in the directory that you configured in the