...
Data Protection Features in MediationZone
Data Masking Agent
...
MediationZone offers data masking capabilities through its Data Masking Agent, ensuring that sensitive personal data is protected in compliance with data protection regulations. This agent facilitates both masking and unmasking of specified fields within User Data Records (UDRs), providing flexibility for batch and real-time data processing workflows.
...
Masking Methods: The Data Masking Agent utilizes a profile-based approach, allowing selection of specific methods for masking—Crypto, Database, or Hash. Each method is tailored to different operational needs and compliance requirements. Supported databases for the Database masking method include Oracle, Postgres, and SAP HANA.
Encryption and Decryption: Offers strong encryption and decryption capabilities using AES-128 and AES-256 standards.
Key Management: Secure management of encryption keys through a JCEKS keystore.
Data Transformation: Ability to transform input data into random data using SHA-256 hashing.
Profile Management: Supports the use of multiple profiles within the agent, enabling different configurations for various data handling requirements.
Error Handling and Logging: Comprehensive error handling and detailed logging mechanisms to track operations and troubleshoot issues effectively.
For more detailed information on each feature and configuration steps, please refer to the Data Masking Agent section in the MediationZone documentation.
Encryption Agent
...
MediationZone offers encryption capabilities through its Encryption Agent. This feature is crucial for protection data in transit and at rest.
...
Restricted Fields and Data Masking: Ensure sensitive fields are restricted and masked to prevent unauthorized unauthorised access and modification. The Data Veracity system allows the configuration of permissions to restrict who can view or edit sensitive data.
Permission Controls: Utilize the The Access Controller to assign and manage permissions for different user levels, ensuring that only authorized authorised personnel can execute sensitive operations like data deletion or modification.
...
PostgreSQL: PostgreSQL Documentation
Oracle Database: Oracle Security Guides
SAP HANA: Refer to SAP Help portal for SAP HANA documentation
Access more information by visiting Data Veracity section in the InfoZone documentation.
...