{"id":14781,"date":"2016-01-25T09:30:00","date_gmt":"2016-01-25T17:30:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/dataplatforminsider\/2016\/01\/25\/use-dynamic-data-masking-to-obfuscate-your-sensitive-data\/"},"modified":"2024-01-30T10:24:59","modified_gmt":"2024-01-30T18:24:59","slug":"use-dynamic-data-masking-to-obfuscate-your-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2016\/01\/25\/use-dynamic-data-masking-to-obfuscate-your-sensitive-data\/","title":{"rendered":"Use Dynamic Data Masking to obfuscate your sensitive data"},"content":{"rendered":"\n
Data privacy is a major concern today for any organization that manages sensitive data or personally identifiable information (PII). Examples of such data include sensitive customer information such as phone numbers, email addresses and bank information, HR data on employees and financial business data.<\/p>\n\n\n\n
This sensitive information is often stored in the database, and it should only be available to specific people on a need-to-know basis. Beyond that need, the sensitive data should not be exposed via the application, or to developers or IT personnel who access the production database directly.<\/p>\n\n\n\n
Traditionally, the logic of obfuscating sensitive data has been developed in the application layer, requiring it to be duplicated across all modules and applications accessing the data. Alternatively, special views have been created to avoid exposure of these sensitive data pieces on the database itself, although these can impact database operations and are susceptible to errors. In other cases, third-party tools have been introduced to manage the concealment of the restricted data.<\/p>\n\n\n\n
SQL Server 2016 and Azure SQL DB now offer a built-in<\/strong> feature that helps limit access to those particular sensitive data fields: Dynamic Data Masking (DDM).<\/strong><\/p>\n\n\n\n