Table of Contents

Search

  1. About the Data Vault Administrator Guide
  2. Introduction to the Data Vault
  3. Data Vault Service Startup and Shutdown
  4. Data Vault Configuration
  5. Data Vault SSL Setup
  6. Data Vault ODBC Setup
  7. Data Vault Administration
  8. Data Repartitioning
  9. Partial Data Vault Copy
  10. Archived Data Migration
  11. Bulk File Uploader
  12. Data Vault Administration Tool
  13. Data Vault Logs
  14. User Account Privileges
  15. ssasql Command Line Program
  16. Data Vault Audit Log
  17. Sample Configuration Files

Data Vault Administrator Guide

Data Vault Administrator Guide

Creating the Security Rules

Creating the Security Rules

The following information is an example of a simple security rules configuration.
Create a security rule set so that you can append the two security rules. The security rules that you create log, identify, and rewrite SQL requests that an application or a client issues to the Data Vault.
Create a rule that logs every incoming request to the security rule set. When the rule engine applies this rule, the resulting information appears in the Dynamic Data Masking
rule.log
file. Use the rule to identify incoming requests that cause the audit to fail. For more information about the
rule.log
file, see the
Informatica Dynamic Data Masking Administrator Guide
.
Create a rule that identifies specific strings of text in the SQL requests that an application or a client issues to the Data Vault. Then, the Rule Engine rewrites the SQL statement to append the
AUDIT USING
and
FROM RESULTSET
tags.
After the Dynamic Data Masking Rule Engine identifies a match and rewrites the SQL statement to append the
AUDIT USING
and
FROM RESULTSET
tags, it sends the rewritten request to the Data Vault. The Data Vault server recognizes the
AUDIT USING
tag and writes the results of the audit to the audit log file. The audit log file is located in the directory that you configured in the
SSA.ini
file for the
AUDITLOGDIR
property.

0 COMMENTS

We’d like to hear from you!