Edit Masking Policies
After you generate the initial masking policy for a target database, you most likely will need to edit it. For example, you might need to address sensitive columns that do not have an associated masking format, change masking formats, apply conditions to some masking formats, mask related columns together as a group (group masking), or add or remove columns from the masking policy.
Fix Columns that Need Attention
If you have one or more columns in your masking policy that are not automatically associated with a masking format, you need to address these columns. This may happen in the following scenarios:
- The sensitive column was discovered by a user-defined sensitive type, but the sensitive type does not have a default masking format assigned to it.
- Data Safe tried to associate a masking format, but
it
was not possible.
This
could've happened in the following scenarios:
- The column contains a value that is incompatible with the column format
- The assigned masking format generates data that exceeds the column size
- The masking format does not guarantee sufficient number of distinct values which could lead to loss of data integrity
You can quickly find the list of columns needing your attention on the Masking Columns Needing Attention page.
- Under Security Center, click Data Masking.
- Under Related Resources, click Masking Policies.
- Click the name of your masking policy to view its details.
- Under Resources, click Masking Columns Needing Attention.
- Locate the rows that have an exclamation mark next to the masking policy. Hover your mouse over the exclamation mark to learn about the issue.
- Select a different masking format for the rows or edit the existing masking formats to resolve the issues. When a masking format is successfully updated, a message states Masking Format Updated Successfully.
Change or Edit the Masking Format for a Sensitive Column
By default, Oracle Data Safe associates a masking format with each sensitive column in a masking policy. If needed, you can select a different masking format or edit the default masking format.
Add Previously Removed Columns to a Masking Policy
You can view the list of columns that were removed from a masking policy in the past and add them back to the masking policy if needed.
Remove Columns from a Masking Policy
You can remove columns from your masking policy that you don't want to mask on the target database. Note that the underlying sensitive data model is not affected.
- Under Security Center, click Data Masking.
- Under Related Resources, click Masking Policies.
- Click the name of your masking policy to view its details.
- Scroll down to the Masking Columns section where all the columns are listed with their associated masking formats.
- To remove a singular column, click the ⋮ symbol to the
right of Masking Column to be removed in the
Masking Columns list.
- Click the Remove option.
- Click Remove Column in the dialog box to confirm the removal of the column.
- To remove multiple columns, click Remove Columns above
the Masking Columns list. The Remove
Columns window is displayed.
Update Tags, Masking Scripts, and Masking Options for a Masking Policy
- Under Security Center, click Data Masking.
- Under Related Resources, click Masking Policies
- Click the name of your masking policy to view its details
- From the More Actions menu select either Add Tags, Update Pre/Post Masking Scripts, or Update Masking Options.
- (Optional) If you would like to add or update tags for your masking policy, configure them in the pop-up after selecting Add Tags. Select the Tag Namespace, Tag Key, and Tag Value from the drop-down lists.
-
(Optional) To upload pre-masking and post-masking scripts, do
the following after selecting Update Pre/Post
Masking Scripts:
- In the Upload Pre-Masking Script area, drop your SQL file. Or, click the select one link, browse to and select your SQL file, and click Open.
- In the Upload Post-Masking Script area, drop your SQL file. Or, click the select one link, browse to and select your SQL file, and click Open.
- (Optional) To customize the execution of the Masking
Policy, do the following after selecting Update Masking
Options:
- Disable or enable redo log generation during masking. This is disabled by default. Redo log generation allows you to use a flashback database to retrieve the original unmasked data after it has been masked.
- Specify the value for parallel
execution:
- NONE - No parallelism is used when data masking process is running.
- DEFAULT - The default value is the optimum number of CPUs to be used in parallel. This is calculated by the Oracle Database.
- DEGREE OF PARALLELISM - Allows you to input an integer to set the number of CPUs to be used in parallel. Refer to the Oracle Database parallel execution framework when choosing an integer value.
Note:
The degree of parallelism is limited by the number of CPUs you have available. If the integer entered in DEGREE OF PARALLELISM exceeds the number of available CPUs, it will default to the maximum CPUs available when processing. - Specify how you would like invalid
objects to recompile after data masking:
- NONE - Invalid objects do not recompile.
- SERIAL- Invalid objects recompile serially, only when the previous objects has finished compiling.
- PARALLEL - Invalid objects
recompile using the same value for parallelism as specified
above.
Note:
If a value for parallelism was not specified, the value used will be the optimized value calculated by the Oracle Database.
- Enable or disable dropping temporary
tables created during data masking after masking is completed. This is
enabled by default. Data Masking creates temporary tables that map the
original sensitive data values to the mask values. Preserve these table
to track how masking changed your data.
Note:
Disabling dropping the temporary tables compromises security. These tables must be dropped before the database is available for unprivileged users. - Enable or disable refreshing the statistics gathered on masked database tables after masking. This is enabled by default.
Compare a Masking Policy to a Sensitive Data Model
When a sensitive data model is modified, a comparison to an associated masking policy can be initiated. The comparison identifies any differences between the sensitive data model and masking policy and allows you to select changes that will sync with the masking policy.
To run a comparison between a masking policy and it's associated sensitive data model:
- Under Security Center, click Data Masking.
- Under Related Resources, click Masking Policies.
- Select a masking policy from the list.
- Under Resources, click Compare with Sensitive Data
Model.
This is only available if the masking policy is associated with a sensitive data model.
- Click the Compare with Sensitive Data Model button.
- Click Submit.
- Once the comparison is complete, review any changes and select any changes that you like to sync under Planned Actions.
- If you did not select all the changes in the previous step, click the
Save Changes for Planned Actions button.
- Click Save.
- Click the Synchronize Masking Policy button.
- Click the Synchronize Masking Policy button in the confirmation dialog.
Once complete the masking policy will be updated with all changes that were selected.