Data Management (DMS) allows you to define fields that contain sensitive and confidential data, such as mobile phone numbers, as sensitive fields. The values of sensitive fields are displayed in the *** format as a query result for users who do not have permissions on the sensitive fields. In addition, DMS provides you with redaction algorithms that allow you to de-identify sensitive data in a flexible manner.

Prerequisites

A database named poc_prod is created. For more information, see Design schemas.
Note This topic shows you how to manage permissions on sensitive data in the poc_prod database.

Specify sensitive fields and redaction algorithms

  1. Log on to the DMS console as a DMS administrator.
  2. In the left-side instance list of the DMS console, right-click the poc_prod database under the poc_prod instance. In the shortcut menu that appears, select Tables.
  3. Click the Show/Hide icon to the left of the name of the data_modify table.
    All the fields of the data_modify table are displayed.
  4. On the Column tab, click Adjust in the column header.
    Adjust the security level
  5. Select Sensitive for the phone field and click Submit for Security Department Approval.
    Increase the security level of the phone field
    The phone field is defined as a sensitive field.
  6. Click OK and wait for approval.
    You are redirected to the Security LevelTicket Details tab. To view the approval status, click View Approval Details.
  7. After the ticket is approved, query the data of the sensitive field on the SQLConsole tab.
    In this example, the returned values of the phone field are fully redacted.The returned values of the sensitive field are fully redacted.
    Note Common users, DMS administrators, and database administrators (DBAs) must apply for permissions on specific sensitive fields before they can view the data of the sensitive fields. For more information, see Apply for permissions to access sensitive fields.
  8. In the top navigation bar, choose System > Security > Sensitive Data.
  9. Find the sensitive field that you want and click Add Algorithm on the right.
    Add Algorithm
    Note You can also enter the name of the sensitive field in the search box to search for the sensitive field.
  10. In the Add Algorithm dialog box, set the parameters as required and click Add.
    Note In this example, the Algorithm Type parameter is set to Fixed Position. For more information about the algorithms that are used to redact sensitive data, see Manage sensitive data.
    Add Algorithm
    Parameter Description
    Algorithm Type The type of the algorithm. Valid values:
    • Fixed Position: The characters at the specified positions are redacted.
    • Fixed Character: The specified characters are redacted.
    • Full Masking: All characters are redacted.
    Masking String The string to display as the de-identified content. Default value: ***.
    Masking Position The positions of the data to be de-identified in the field value. In this example, set the parameter to (1,5), which indicates that the first to fifth characters are redacted. You can also set the parameter to (5) for short.
    Note You can specify a maximum of three positions, such as (1,4),(6,7),(-2). In this case, the first four characters, sixth and seventh characters, and last two characters are redacted.
    Algorithm Description The description of the algorithm.

Apply for permissions to access sensitive fields

Common users, DMS administrators, and DBAs must apply for permissions on specific sensitive fields before they can query the data of the sensitive fields. This example demonstrates how to apply for permissions on sensitive fields as a common user.

  1. Log on to the DMS console as a common user.
  2. In the top navigation bar, choose Permission > Apply Permission > Sensitive Column-Permission.
  3. On the Permission Application Ticket tab, enter poc_prod as the database name and click Search.
  4. Select the sensitive field that you want from the matched result and click Add. The sensitive field appears in the Selected Databases/Tables/Columns section.
    Apply for permissions on the sensitive field
  5. In the Select Permission section, set the parameters as required and click Submit. The following table describes the parameters.
    Select Permission
    Parameter Description
    Permission The type of permission for which you want to apply. Valid values: Query, Export, and Change.
    Note You can select one or more permission types.
    Data Masking Method The way in which the sensitive data is displayed. Valid values:
    • Semi-sensitization: The data is displayed in the format that is generated after the specified redaction algorithm is performed.
    • Plain Text: The data is displayed in plain text.
    Note Assume that you select Export for the Permission parameter and set the Data Masking Method parameter to Semi-sensitization when you apply for permissions on a sensitive field. In this case, if you export the data of the sensitive field, the exported data is de-identified.
    Duration The validity period of the selected one or more permissions.
    Reason The description of the business background and the reason for this application. This reduces unnecessary communication and facilitates the approval process.
    Note After a permission application ticket is submitted, wait until the ticket is approved. You can view the status of the ticket in the My Tickets section of the Workbench tab.
  6. After the ticket is approved, query the data of the sensitive field on the SQLConsole tab.
    In this example, the Data Masking Method parameter is set to Semi-sensitization. Therefore, the values of the phone field are displayed in the format that is generated after the specified redaction algorithm is performed.The data is de-identified based on the redaction algorithm.