Sensitive Data Masking
Database Lab allows a robust and centralized means to both mask1 and control access to test and staging databases. Implement masking rules within the Database Lab Engine to adhere to security best practices and simplify external audits.
Control Data Access for Security and Compliance
Security certifications such as SOC2, ISO 27001, and HIPPA dictate strict controls governing access to and visibility of production data. Organizations seeking third party certification of their adherence to these standards are required to demonstrate several things:
- Only specially authorized employees can access production (or customer) data
- This access is regularly audited
- Internal systems (such as staging or test environments) have no sensitive data
Database Lab gives organizations a clear and centralized means to achieve these objectives.
A Comprehensive Approach to Masking
The Database Lab Engine provides a robust API that gives software teams the power to implement a multi-faceted and comprehensive approach to data masking. There are three pillars to well-implemented masking:
- Hashing & Randomization - Randomize parts or all of a value using either deterministic or non-deterministic methods
- Data Generation & Destruction - Generate fake data using a variety of algorithms or simply destroy it
- Data Generalization - Replace an original value with one truncated to a lower precision
Learn more about masking techniques with our recommended tool: PostgreSQL Anonymizer.
Clear and Auditable Rules
Database Lab recommends a declarative approach to data masking using PostgreSQL Anonymizer.
Masking rules are declared as security labels within the schema itself.
create table player(
insert into player(name, points)
('Kareem Abdul-Jabbar', 38387),
('Michael Jordan', 32292);
security label for anon on column player.name
is 'MASKED WITH FUNCTION anon.fake_last_name()';
security label for anon on column player.id
is 'MASKED WITH VALUE NULL';
Colocating security rules and data gives software teams better visibility and control over access to data.
- Security rules can change alongside schema changes
- Security rules can be reviewed and audited using standard code reviews
- Security rules can share the same access control scheme as the database
Database Lab gives organizations a flexible and powerful way to protect sensitive data within their organization and to comply with security standards.
- 1 We use the term "masking" to refer to the general process of both data masking and data anonymization. Database Lab allows customers to implement a variety of specific approaches to data masking including both dynamic and persistent (or "in-place") methods.