Using the Replace Table Rule Action to Implement Row-Level Security

Using the Replace Table Rule Action to Implement Row-Level Security

Overview

Overview

You can use the Replace Table rule action to remove sensitive rows from the result set when an unauthorized user accesses the database. Include a rule that uses the Define Symbol rule action to provide row-level security and limit which rows the user can view. A masking rule removes sensitive columns from the result set.
For example, the Human Resources Manager in the Sales department of your organization must have access to employee data, such as names, birth dates, and contact information. You want to block access to employee information in other departments and you want to block access to all salary information.
Before you begin this example, you must have a database connection and a Dynamic Data Masking service configured in the Management Console. For information about creating database connections and adding services, see the
Dynamic Data Masking Administrator Guide
.
In this example, you perform the following tasks:
  1. Create a connection rule that directs database requests to a security rule set.
  2. Create a security rule set.
  3. Create a security rule folder that identifies requests to the EMPLOYEES table.
  4. Create a Define Symbol rule that defines a symbol for the Sales department identification number.
  5. Create a Replace Table rule that filters out rows from the result set that contain information about employees in other departments.
  6. Create a masking rule that masks salary information.

0 COMMENTS

We’d like to hear from you!