Data Access Management > Introduction to Data Access Management > Data access policy process
  

Data access policy process

To protect data and control access to your data, you perform steps on the Data Access Management page to create data access policies, rules, and data protections.
The data access control workflow includes the following steps:
  1. 1Determine which type of data access policy best fits your use case.
  2. For more information, see Data access policy selection.
  3. 2On the Data Access Management page, create a data access policy.
  4. You can create the following types of data access policies:
    For more information, see Creating data access policies.
  5. 3If you determine that you will be creating data de-identification policies, do the following:
    1. aCreate precedence tiers so you can select them when you are creating the policies.
    2. For more information, see Precedence tiers.
    3. bCreate data protections so you can select them when you are creating data de-identification rules.
    4. For more information, see Data protections.
  6. 4Create one or more rules to add to the data access policy.
  7. The rule type matches the data access policy type. Rule types include the following:
  8. 5Publish the data access policy and enable it.
  9. For more information, see Publishing a data access asset.
The data access policy is now active.