Skip to main content

Configure Masking Rules

Adding a New Masking Rule

To add a new encryption rule:

  1. Specify where the rule applies (Record, State, or Log) and click the “+” icon in the Masking Rules section to add a new rule.

  2. Fill in the following fields:

    • Rule Name: Provide a unique name for the rule.
    • Regex Pattern: Define the pattern that identifies sensitive data.
    • Masking Technique:
      • Hashing: Replaces original data with a fixed-length cryptographic hash (SHA-256).
        • Optional: Add a prefix to the hashed string for uniqueness.
        • Explanation: Hashing replaces the original data with a fixed-length string generated by a cryptographic hash function (SHA-256), ensuring data integrity and security.
      • Replacing: Masks the data with asterisks (*) or a user-specified string.
        • Default: Substitution with asterisks.
        • Explanation: Replacing masks the original data by substituting it with asterisks (*) or a specified string, effectively hiding sensitive information.
          Notice! This will prevent you from tracing this data as it removes the original data.
  3. Save the rule by clicking “Save Changes.” Feedback will be provided:

    • If successful: “Changes saved successfully.”
    • If an error occurs: The system will highlight the issue and display specific error messages:
      • “Rule name is required.”
      • “Regex expression is required.”
      • “Regex expression is invalid.”

Editing Masking Rules

To modify an existing rule:

  1. Select the rule from the list and edit the desired fields.
  2. Click “Save Changes.”
    • If successful: “Changes saved successfully.”
    • If no changes are made: The Save Changes button will remain disabled.
  3. If you navigate away without saving, a pop-up will appear:
    • “You have unsaved changes. Are you sure you want to leave without saving?”

Deleting a Masking Rule

To remove an encryption rule:

  1. Select the rule to delete and click Delete.
  2. A confirmation prompt will appear:
    • “Are you sure you would like to delete this rule?”
  3. Once confirmed, the rule will be removed, and the masking process will immediately exclude the deleted rule.