Data Access Management > Data protections > Creating data protections
  

Creating data protections

You create data protections and add them to data de-identification rules, which determine where and when to apply the data protections to data. You start by selecting a data type, then a relevant data de-identification technique, and finally defining how it transforms data.
A data protection can apply a different data de-identification technique per data type. For example, you can stipulate that the same data protection apply the truncate technique to a string, the tokenize technique to an integer, and the redact with null technique to unknown data types.
    1Click Data Access in the left navigation.
    2Click Data De-identification.
    3Click Data Protection.
    A list of current data protections appears.
    The following image shows the Data Protection tab:
    The image shows a table on the Data Protection tab that lists the names and descriptions of each data protection, data types associated with each data protection, the lifecycle stage, and the date a user last updated it.
    4Click the plus sign.
    The new data protection page appears.
    The following image shows the new data protection page:
    The image shows the new data protection page, which has the following fields: Name, Description, and Reference ID. A Stakeholders section appears at the bottom of the page. "Create" and "X" buttons appear at the top of the page.
    5Enter a name for the data protection.
    6Optionally enter a description, a reference ID, and select stakeholders.
    7Click Create.
    The overview page appears.
    8Click Techniques.
    The Unknown/Any technique appears.
    9Click the plus sign to add data types relevant to this data protection.
    When you select a type, the Create Technique window appears.
    10Select a technique type.
    Fields appear to allow you to define the behavior of the data protection. The fields vary depending on the type of data de-identification technique that you select. See De-identification techniques for an explanation of each data de-identification technique .
    The following image shows an example of the fields used to define the behavior of one type of data protection:
    The image shows an example of the fields used to define the behavior of a data de-identification technique. The example shows the Truncate data de-identification technique with an "Add Technique" button. Another field is titled "Number of characters to truncate." The user entered the number 3 and selected "Retain First Few Characters." An "X" button appears at the top of the page.
    11Complete the relevant fields to determine the behavior.
    12Click Add Technique.
    13Click Publish.
    The data protection is now available to add to data de-identification rules.

Creating default data protections

Before creating any data de-identification policies, Informatica recommends that you create default data protections for retaining values and redacting values to NULL.
    1Follow the instructions in Creating data protections.
    2Name one data protection "Retain Value."
    3Set this data protection for the "Any/Unknown" data type.
    4Assign the Retain data de-identification technique to the data protection.
    5Create a second data protection with the name "Redact With Null."
    6Set this data protection for the "Any/Unknown" data type.
    7Assign the Redact with null data de-identification technique to the data protection.
    You can now select these data protections when creating data de-identification rules.