Data Access Management > Introduction to Data Access Management > Data access policy process
  

Data access policy process

To protect data and control access to your data, you perform steps on the Data Access Management page to create data access policies, rules, and data protections.
To protect and control access to your data, perform the following steps:
  1. 1Determine the data access policy type that best fits your use case.
  2. For more information, see Data access policy selection.
  3. 2On the Data Access Management page, create a data access policy.
  4. You can create the following types of data access policies:
    For more information, see Creating data access policies.
  5. 3If you determine that you will be creating data de-identification policies, perform the following tasks:
    1. aCreate precedence tiers so you can select them when you create the policies.
    2. For more information, see Precedence tiers.
    3. bCreate data protections so you can select them when you are create data de-identification rules.
    4. For more information, see Data protections.
  6. 4Create one or more rules to add to the data access policy.
  7. The rule type matches the data access policy type. Rule types include the following rules:
    If you do not have a workflow configured, the data access policy will automatically change to published status.
    If you have a workflow configured, the data access policy will change to draft status.
    For more information about designing workflows, see Workflows in the Metadata Command Center help.