37. Product Overview
The Accelario Data Masking module enables in-place masking using an intelligent, sensitive data search engine to easily locate and mask sensitive data. Data masking is performed in accordance with either customized or predefined masking policies (e.g. GDPR, HIPAA). Masked data is transformed into production quality data which preserves referential integrity with minimal user intervention throughout the masking process.
It contains the following components:
Privacy Dashboard
Data Sources
Environments
Sensitive Data Search
Masking Editor
Masking Rules
Privacy Policies
Masking configurations
Users
System Setup
Job Monitoring
Event Viewer
Privacy Dashboard
Accelario Privacy Dashboard provides clear indications of your privacy exposures. It can scan all non-production data sources for privacy issues. With just one click you can easily drill-down to see an exposed data source. In the Privacy Dashboard window, you can:
Scan all data sources for sensitive data with one-click, compliant with specific privacy policies such as GDPR, CCPAV, PCI, HIPAA.
Refresh all data sources – metadata DDL is updated from the source. New / altered / deleted tables and columns are automatically updated.
See a global view of sensitive data for all managed data sources.
See a detailed view of sensitive data per managed data source.
Find privacy exposures at any level: data source, environment, database, schema, table/collection, and column/key.
Â
Data Sources
A Data Source is a database or a file where data that is being used comes from. A Data Source is given a name and the location of the server is specified to set up a connection to the database . From the Data Sources window, you can:
Add a new data source
Modify/remove an existing data source
For more information, see 37. Managing Data Sources.
Only a user with Admin privileges can see or edit Data Sources.
Environments
An Environment is an object that groups together database schemas from a data source. An environment object is used for scanning and masking. From the Environments window, you can:
Add a new environment from a data source schema
Modify/Remove an existing environment
Refresh an environment – metadata is updated from the data source. new / altered / deleted tables and columns are automatically discovered / discarded. Foreign key relationships are updated to maintain referential integrity.
For more information, see 37. Managing Environments.
Sensitive Data Search
Accelario Data Masking incorporates an intelligent search engine that leverages advanced search algorithms containing lookup lists and AI technology. From the Sensitive Search window, you can:
Scan an environment with one-click, compliant with specific privacy policies such as GDPR, CCPA, PCI, HIPAA.
Masking rules are automatically assigned to the correct sensitive column(s)/key(s).
Foreign key groups are assigned with the same masking rules to maintain referential integrity.
See a high-level view of the scan results including Top Sensitive Data and statistics.
See a detailed view of all sensitive columns/keys that were found.
Select the sensitive column/key to be masked.
Masking Editor
With the Masking Editor you can view/modify selected sensitive columns and manually assign masking rules to columns. From the Masking Editor window, you can:
Assign/modify a masking rule for a specified column/key.
Add a Where Clause to a table for masking.
Perform Backup / Restore of a masking configuration file.
Save/Load masking configuration.
Provide name and version for masking configurations
Adjust default parameters for sensitive search and masking processes.
Execute and monitor a Mask operation in the Progress Monitor window.
Add a Mailing Rule to mask an address that is spread over several columns in a particular table for a valid address.
Masking Rules
A Masking Rule contains both the scanning and masking methods used to search for and mask specified sensitive data (e.g. Name, Email, Credit Card, etc.). From the Masking Rules window, you can:
See all supported built-in masking rules
Add and manage custom masking rules
Duplicate built-in/custom masking rule to create a new custom masking rule For more information, see Managing Masking Rules.
Privacy Policies
A Privacy Policy is a set of masking rules that are used to scan and mask following a specified privacy regulation such as GDPR, CCPA, HIPPA, PCI or a set of organizational specific privacy rules. From the Privacy Policies window, you can:
Add a new privacy policy.
View, modify, and duplicate a privacy policy.
Users
Accelario Data Masking uses a role-based user management system. All users can access the Privacy Dashboard. Users are divided into the following categories:
Admin – and Admin user can manage data sources, all environments and perform monitoring and troubleshooting
Regular users – regular users are restricted to scan and mask only the environments that they have authorized access
From the Users Management window, you can:
Create and modify users
Create and modify roles
System Setup
The System Setup is used to define system parameters, such as SMTP, Active Directory, etc. From the System Setup window, you can:
Configure Active Directory Authorization
Configure SMTP configuration
Install new built-in masking rules online
Job Monitoring
Job Monitoring is used to monitor the status of current system jobs. From the Job Monitoring window, you can:
See all current or just terminated system jobs (the history system jobs can be seen in the Event Viewer window)
Drill down and see the detailed status of some of the system jobs.
Event Viewer
The Event Viewer is used to view and save all user events. From the Event Viewer window, you can:
View/filter/search all user events
Save all user events to a file
Â