{"id":17670,"date":"2024-07-09T19:07:01","date_gmt":"2024-07-09T23:07:01","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=17670"},"modified":"2024-07-10T10:45:31","modified_gmt":"2024-07-10T14:45:31","slug":"how-to-mask-pii-in-a-database","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/","title":{"rendered":"How to Mask PII in a Database"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">First released in 2011, the <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> database data masking tool helps you <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">classify, find, and de-identify<\/span><\/a><span style=\"font-weight: 400;\"> personally identifiable information (PII) or other sensitive data in structured relational database (RDB) sources. FieldShield also supports fixed and delimited files, flat XML and JSON, Excel, and ASN.1 CDR files. IRI <\/span><i><span style=\"font-weight: 400;\">DarkShield<\/span><\/i><span style=\"font-weight: 400;\"> supports RDBs and other sources, too. <span id='easy-footnote-1-17670' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#easy-footnote-bottom-1-17670' title='\u00a0&lt;em&gt;If you have semi-structured or unstructured data in your RDB, or you are interested in finding and masking PII in NoSQL DBs, EDI files, PDF and MS documents, or image files, check out &lt;a href=&quot;https:\/\/www.iri.com\/products\/darkshield&quot;&gt;IRI DarkShield&lt;\/a&gt;. DarkShield uses the same GUI, data classes, and masking rules as FieldShield to provide data integrity on-premise or in the cloud enterprise wide. You can also use &lt;a href=&quot;https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-relational-databases-with-the-darkshield-rdb-wizard\/&quot;&gt;DarkShield for RDB&lt;\/a&gt; sources as well; see &lt;a href=&quot;https:\/\/www.iri.com\/company\/faqs\/190&quot;&gt;this FAQ&lt;\/a&gt; for guidance vs. FieldShield.&lt;\/em&gt;'><sup>1<\/sup><\/a><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article only summarizes the steps <\/span><i><span style=\"font-weight: 400;\">FieldShield<\/span><\/i><span style=\"font-weight: 400;\"> users normally take to connect to, classify, discover, mask, and audit PII in a relational database. Below you will see links to other articles in the IRI blog which detail each of these steps. <span id='easy-footnote-2-17670' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#easy-footnote-bottom-2-17670' title='\u00a0&lt;i&gt;There is also help within the IRI Workbench &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/products\/workbench\/fieldshield-gui&quot;&gt;&lt;i&gt;GUI&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt; for FieldShield, &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.youtube.com\/playlist?list=PL7nHBVSFkLEAhaZ6HeMRuVKE273Xl-unC&quot;&gt;&lt;i&gt;YouTube videos&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt;, and product manual. Self-directed and IRI-supervised &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/services\/training&quot;&gt;&lt;i&gt;learning services&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt; are also available to expedite your solution.&lt;\/i&gt;'><sup>2<\/sup><\/a><\/span><\/span><\/p>\n<p><strong>This diagram represents the most common workflow:<\/strong><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17675\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-209x300.png\" alt=\"\" width=\"495\" height=\"710\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-209x300.png 209w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow.png 713w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-768x1103.png 768w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/p>\n<h4><b>Step-by-Step<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">By way of more detail, FieldShield users typically follow these steps:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17682\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-256x300.png\" alt=\"\" width=\"604\" height=\"708\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-256x300.png 256w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1.png 875w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-768x899.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-1312x1536.png 1312w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-1749x2048.png 1749w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">1. Once you have installed <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">, and licensed the FieldShield masking <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">executable<\/span><\/a><span style=\"font-weight: 400;\">, make both JDBC and ODBC <\/span><a href=\"https:\/\/www.iri.com\/services\/training\/courseware#db-connections\"><span style=\"font-weight: 400;\">connections<\/span><\/a><span style=\"font-weight: 400;\"> to each database to be masked. For files, identify local or remote folder locations.<\/span><\/p>\n<p>2. Use wizards in the <a href=\"https:\/\/www.iri.com\/products\/workbench\/discover-data\">data discovery<\/a> menu to profile your data sources, build E-R diagrams to model RDB schema, perform referential integrity checks, and search for specific items matching a pattern. You can find much more however using data classification (see below).<\/p>\n<p>3. <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\">Define data classes<\/a> (e.g., passport #, name, phone), or class groups (e.g., citizen PII) as needed, and assign to them search methods and masking functions. Then run the search wizard for your <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/schema-data-class-search-2\/\">DB schema<\/a> (or <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/directory-data-class-search-wizard\/\">file folders<\/a>). The search jobs produce log reports, dashboards, and a <a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/data-class-mapping-in-iri-workbench\/\">Data Class Map<\/a> you can review <i>before <\/i>the bulk data masking wizards use it to consistently apply your rules to your data classes (which ensures referential integrity).<\/p>\n<p><span style=\"font-weight: 400;\">4. Run the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-a-relational-db-with-fieldshield\/\"><i><span style=\"font-weight: 400;\">New Data Class Map DB Masking Job &#8230;<\/span><\/i><\/a><span style=\"font-weight: 400;\"> or the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-flat-files-in-the-fieldshield-gui\/\"><i><span style=\"font-weight: 400;\">New Data Class File Map Masking Job \u2026<\/span><\/i><\/a><span style=\"font-weight: 400;\"> wizard. You will apply a default or chosen <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">data masking function<\/span><\/a><span style=\"font-weight: 400;\"> for each data class <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-function-use\/\"><span style=\"font-weight: 400;\">based on<\/span><\/a><span style=\"font-weight: 400;\"> its need for reversibility, realism, uniqueness, consistency, and security. You can also configure these data masking jobs in mapping diagrams, 4GL scripts, or an IRI API.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">5. Jobs once created are easily run and modified for iterative testing, where output can first be virtualized to the console, file or sample tables for review, modification, sharing, and re-use. SQL query and update logic can be inside scripts or workflows for <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/real-time-incremental-data-masking\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=real-time-incremental-data-masking\"><span style=\"font-weight: 400;\">real time<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.iri.com\/blog\/etl\/incremental-data-masking-and-mapping\/\"><span style=\"font-weight: 400;\">incremental<\/span><\/a><span style=\"font-weight: 400;\"> masking jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6. An included <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/hipaa-re-id-risk-scoring\/\"><span style=\"font-weight: 400;\">risk-scoring wizard<\/span><\/a><span style=\"font-weight: 400;\"> statistically measures the likelihood that a masked data set (table) can still be used to identify an individual based on quasi-identifying information in the row.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7. Further masking jobs can address the risks exposed in the scoring report by <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/blur\"><span style=\"font-weight: 400;\">blurring or bucketing<\/span><\/a><span style=\"font-weight: 400;\"> quasi-identifying values like birthdate and age. These techniques render the data anonymous, but still fit for purpose.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">8. As you gain success and confidence in the above processes, and begin to satisfy production data masking needs, you should also take stock of your job performance and metadata assets (source layouts, task and batch scripts, encryption keys, etc.). Use an IRI Workbench plugin like <\/span><a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/introduction-metadata-management-hub\/\"><span style=\"font-weight: 400;\">Git<\/span><\/a><span style=\"font-weight: 400;\"> to secure, share, version control, and track changes to your metadata.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">9. During and after the go-live dates, follow IRI recommendations to monitor performance, manage updates to data, conditions and software and address new use cases or audit requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can mask data in your production or test schema; you define the sources, targets, and flow. The most common is ETL; i.e., read from production, masking in the engine and writing to test.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Watch this video of a typical job: <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=ALwQA9OigK8&amp;ab_channel=IRI-TotalDataManagement\"><span style=\"font-weight: 400;\">https:\/\/www.youtube.com\/watch?v=ALwQA9OigK8&amp;ab_channel=IRI-TotalDataManagement<\/span><\/a><\/p>\n<h4><b>What\u2019s Next?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">After FieldShield masking is performed, you can also:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Validate the results in your target tables for privacy, realism, and referential integrity<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Audit the discovery (search), data masking job, and performance logs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate the batch via the IRI (or your) job scheduler or integrate it into a CI\/CD pipeline<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perform re-ID risk-scoring (usually for HIPAA expert determination method compliance)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Build and run additional anonymization jobs to further obscure quasi-identifiers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Add additional targets, filters, transforms, DQ functions, or formatting to any of the jobs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use its data classes and masking rules in a DB subsetting, Ripcurrrent, or DarkShield job<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Share, version control, change-track and otherwise secure any job artifacts in Git<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you have any questions or need help masking your database, email <\/span><a href=\"mailto:fieldshield@iri.com\"><span style=\"font-weight: 400;\">fieldshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First released in 2011, the IRI FieldShield database data masking tool helps you classify, find, and de-identify personally identifiable information (PII) or other sensitive data in structured relational database (RDB) sources. FieldShield also supports fixed and delimited files, flat XML and JSON, Excel, and ASN.1 CDR files. IRI DarkShield supports RDBs and other sources, too.<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\" title=\"How to Mask PII in a Database\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":17686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-17670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Mask PII in a Database - IRI<\/title>\n<meta name=\"description\" content=\"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Mask PII in a Database - IRI\" \/>\n<meta property=\"og:description\" content=\"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T23:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-10T14:45:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"How to Mask PII in a Database\",\"datePublished\":\"2024-07-09T23:07:01+00:00\",\"dateModified\":\"2024-07-10T14:45:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\",\"name\":\"How to Mask PII in a Database - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"datePublished\":\"2024-07-09T23:07:01+00:00\",\"dateModified\":\"2024-07-10T14:45:31+00:00\",\"description\":\"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Mask PII in a Database\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Mask PII in a Database - IRI","description":"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/","og_locale":"en_US","og_type":"article","og_title":"How to Mask PII in a Database - IRI","og_description":"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.","og_url":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/","og_site_name":"IRI","article_published_time":"2024-07-09T23:07:01+00:00","article_modified_time":"2024-07-10T14:45:31+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","type":"image\/png"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/"},"author":{"name":"David Friedland","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"How to Mask PII in a Database","datePublished":"2024-07-09T23:07:01+00:00","dateModified":"2024-07-10T14:45:31+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/","url":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/","name":"How to Mask PII in a Database - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","datePublished":"2024-07-09T23:07:01+00:00","dateModified":"2024-07-10T14:45:31+00:00","description":"Learn how to classify, discovery, and consistently mask PII in your relational database(s) while preserving realism and referential integrity.","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-transformation2\/how-to-mask-pii-in-a-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Mask PII in a Database"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/beta.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=17670"}],"version-history":[{"count":8,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670\/revisions"}],"predecessor-version":[{"id":17683,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670\/revisions\/17683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/17686"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=17670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=17670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=17670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}