Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Connection Management
  5. JDBC Client Configuration
  6. ODBC Client Configuration
  7. Access Control
  8. Logs
  9. High Availability
  10. Server Control
  11. Performance Tuning
  12. Troubleshooting

Administrator Guide

Administrator Guide

Dynamic Data Masking Implementation

Dynamic Data Masking Implementation

Set up Dynamic Data Masking based on the type of environment where you want to implement data masking and the requirements for protecting sensitive data within that environment.
Use the following general guidelines when you set up Dynamic Data Masking:
  1. Install the Dynamic Data Masking Server on the database server.
    Dynamic Data Masking adds a processing layer between applications and databases. To reduce latency in data transfer, you can install the Dynamic Data Masking Server on the same machine as the database.
  2. Configure the client application and database server so that the application sends database requests to the Dynamic Data Masking listener port.
    For example, you install the Dynamic Data Masking Server on the Oracle database server. Edit the
    listener.ora
    file on the database server and set the database port to a different port number. Then set the Dynamic Data Masking listener port number to match the port number to which the application sends database requests.
  3. Before you start using Dynamic Data Masking, examine the database and classify data as highly sensitive, moderately sensitive, or not sensitive based on the data classification policy of your organization.
    The data classification you identify determines the rules you need to create in Dynamic Data Masking.
  4. Categorize users according to their access permissions.
    Create user access scenarios to determine the applications that access sensitive data and identify the data that must go through Dynamic Data Masking.
  5. In Dynamic Data Masking, create connection and security rules to implement the data classification and user and application access policies of your organization.

0 COMMENTS

We’d like to hear from you!