Test Data Privacy Disguise Rules
BMC AMI Test Drive
MC Compuware Test Data Privacy – Disguise Rules
This tutorial will introduce you to the BMC AMI DevX Data Studio Test Data Privacy Manager to create Disguise Rules to be used to disguise different data elements.
Revised: 2024/03/13 00:00
Getting Started
BMC AMI DevX Data Studio Data Privacy Manager
Data Privacy Rules Repository
Create Your Own TDP Project
Add Data Elements- Add Source Data Identifiers
- Disguise Rules
Coverage
Getting Started
Instructions:
- This guide contains many screenshots to provide a visual reference
- Please note each place that you must enter your own specific ID or number
- You must complete each step before proceeding to the next to successfully follow the test drive script
If, at any point during your experience, your host connection times out, you may need to log back in to the TestDrive host connection.
If at any time during the execution of this script the Compuware Enterprise Services Login popup is shown, enter your test drive ID and password under User ID and Password, check the Save credentials box and then depress the ENTER key or click OK.
BMC AMI DevX Data Studio Data Privacy Manager
Data privacy rules are created in the DevX Data Studio plug-in and stored in a repository. These rules are then available to disguise data from each of the following products:
- File-AID/EX
- File-AID/Data Solutions
- File-AID for DB2
- File-AID/RDX
- File-AID for IMS
The data to be disguised may reside in z/OS files, IMS databases, or relational database tables in DB2, DB2 UDB, Microsoft SQL Server, Sybase, or Oracle. Other file types such delimited, flat files, CSV, or XML can be disguised as well.
In this exercise you will:
- Create at least two Rule Action Types
- Format Preserving Encryption for Phones, SSNs, and Credit Cards
- Translation for names
- Use the provided translate table
- Use Expression Builder
- Literal Values
- Date Aging
- Coverage
- View the rules against the metadata
Data Privacy Rules Repository
Data Privacy Rules are created and stored in a Rules Repository. A windows service called File-AID Services enables connectivity to defined repositories. These rules can then be called later to disguise data at the time of execution of a copy, convert, or extract job.
BMC AMI DevX Workbench for Eclipse connects to the File-AID Services through a setting in Workbench Preferences.
Here you will see the link to the machine and port where File-AID Services is running.
Create Your Own TDP Project
Here you will see the overview for the data privacy project. The three sections that we will work with on the right are Data Elements, Rules, and Coverage. These correspond to the tabs across the bottom.
Add Data Elements
Data Elements are containers that allow you to normalize multiple fields into a common item based on data identification instructions.
The other data handling characteristics available when creating Data Elements are accessible through the left-hand pane. The screens are shown below in order:
Value Alignment:
Invalid and Long Data Values:
Null Values:
References:
Add Source Data Identifiers
Source Data Identifiers locate the actual data associated with a data element. At disguise execution time, the data identification process is invoked to match the content of the Source Data Identifier against the metadata of the object being disguised. For z/OS files, the metadata is the COBOL or PL/I layout. For DBMS objects, the metadata is the column definition from the DBMS catalog.
Above is an example of the different Source Data Identifiers (SDI) for the SSN Data Element. Any columns or fields matching these identifiers will be disguised by the rule for SSN.
Disguise Rules
Encryption Rule
Field Masking
Use Field Masking to determine which bytes of data to apply disguise. In this example we will disguise only a portion of the phone number.
The first 3 bytes will be excluded from encryption and will retain the original values.
Golden principle: Rules are created for Data Elements. The Source Data Identifiers defined to the Data Element determine which columns and fields will be disguised by that rule.
Translation Rules
Translation Rules are commonly used for data that needs to be meaningful and readable such as names and addresses.
For example, if the translate table has 1000 rows, this will hash the first name to a value between 1 and 1000 and point to that row.
Rule Logic
Literal Values
This is an example of replacing sensitive data with a literal value for every row or record.
Date Aging Logic
This will age the original values by 3 days. Calendar intelligence is built in and will roll dates to the next month or year accordingly and never return an invalid date such as February 30th.
You have now successfully created disguise rules to replace sensitive data in fields or columns containing Names, Phone Numbers, Social Security Numbers, Credit Card Numbers, Dates, and Email addresses.
These rules exist in your project in the repository and can be used against multiple data types including but not limited to SQL Server, Oracle, Sybase, Db2 and DB2 z/OS, VSAM, sequential, IMS, Excel, Access, Flat Files, Delimited Files, and XML.
Coverage
When a project is created, a Coverage tab is available for project metadata. However, there is no requirement to define metadata to the project. If metadata is defined to the project, however, coverage can be displayed for any single metadata, and coverage reports can be requested against the list of project metadata.
Let's view how the rules you created in this project would be applied to a table that we will be disguising.
Check Coverage against a data source.
This will open a window at the bottom with the metadata from that table showing what columns are being identified as Data Elements and what rules will be applied when we move the data.
In this view you can see how the rules created will be applied. The DE: denotes the Data Element and the symbol denotes the Source Data Identifier for each column eligible to be disguised. Under the Rule column is listed the Disguise Rule that will be applied.
You can also use this Coverage View to add Source Data Identifiers.
You will use these rules saved in the project in the next script.
This completes the Disguise Rules section. Please proceed to the Composite Rules Script before logging out of Test Drive to build upon your Data Privacy Project.
To use the Data Disguise Project that you created in this exercise do not leave Test Drive. Otherwise, you can view an existing project that has been created for you but the work has already been completed.