{"id":12458,"date":"2021-09-23T12:36:23","date_gmt":"2021-09-23T16:36:23","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=12458"},"modified":"2025-07-28T11:26:46","modified_gmt":"2025-07-28T15:26:46","slug":"masking-mapping-data-in-a-snowflake-database","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/","title":{"rendered":"Masking &#038; Mapping Data in a Snowflake Database"},"content":{"rendered":"<p><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">Finding and masking<\/span><\/a><span style=\"font-weight: 400;\"> personally identifiable information (PII)<\/span><span style=\"font-weight: 400;\"> in Snowflake\u00ae data warehouses works the same way in IRI <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">FieldShield<\/span><\/a><span style=\"font-weight: 400;\">\u00ae or <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\"><span style=\"font-weight: 400;\">Voracity<\/span><\/a><span style=\"font-weight: 400;\">\u00ae installations as it does for other relational database <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\"><span style=\"font-weight: 400;\">sources<\/span><\/a><span style=\"font-weight: 400;\">. This article shows how I masked some of the columns in an online table after <\/span><a href=\"https:\/\/www.iri.com\/blog\/etl\/connecting-snowflake-db-iri-workbench\/\"><span style=\"font-weight: 400;\">connecting my Snowflake warehouse in AWS to IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">\u2122 is the graphical IDE built on Eclipse\u2122 for the design, deployment and sharing of data lifecycle management activities in the areas of data discovery, integration, migration, governance and analytics. Powered by fast, <\/span><a href=\"https:\/\/www.iri.com\/solutions\/big-data\/hadoop-optional\"><span style=\"font-weight: 400;\">interchangeable<\/span><\/a><span style=\"font-weight: 400;\"> IRI CoSort\u00ae or Hadoop\u00ae engines, the IRI Voracity platform and its subset IRI products cover a wide range of <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\/technical-details#capabilities\"><span style=\"font-weight: 400;\">use cases<\/span><\/a><span style=\"font-weight: 400;\"> involving:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data profiling, classification, and extraction<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data migration, replication and change data capture<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data integration for data warehouses, data lakes, and production analytics<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Embedded BI reporting, or data wrangling for visualization tools<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data cleansing, validation, and unification<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data masking, subsetting, and test data generation<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The sample jobs filter, sort, mask and remap data selected from a Snowflake source table out to both a Snowflake target table and flat file. All the capabilities listed above share the same look and feel in Workbench.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the before\/after views below, you see that I pulled seven columns out the CUSTOMER table and masked three of them. Specifically, I applied: a partial redaction (obfuscation) of the ID column, a set-lookup pseudonymization for the last name, and an AES-256 format-preserving encryption function to the email address. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This one goes from a read-only into a masked file:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-18480 aligncenter\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/masked-file-300x164.png\" alt=\"\" width=\"843\" height=\"461\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/masked-file-300x164.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/masked-file-1024x561.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/masked-file-768x421.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/masked-file.png 1280w\" sizes=\"(max-width: 843px) 100vw, 843px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">And this job takes data from a similar table in a read\/write Snowflake database called IRI_POC and out to a file and another Snowflake table:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-18481\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/snowflake-table-300x224.png\" alt=\"\" width=\"648\" height=\"484\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/snowflake-table-300x224.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/snowflake-table-1024x766.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/snowflake-table-768x574.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/snowflake-table.png 1296w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">You can see my ETL\/masking task specified in the <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">4GL job script<\/span><\/a><span style=\"font-weight: 400;\"> and its interactive outline above. Although the scripts are nice to have, share, and modify by hand, there is no need to learn or hand-code them. These \u201cSortCL\u201d-based jobs can be created and tweaked graphically in automatic job building wizards, dialog, and mapping diagrams like this one:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-18482\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/mapping-diagram-300x145.png\" alt=\"\" width=\"769\" height=\"372\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/mapping-diagram-300x145.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/mapping-diagram-1024x494.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/mapping-diagram-768x371.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/mapping-diagram.png 1110w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The orange connection lines indicate field derivations; in this case, masking functions. Note that this diagram shows just a few of the <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\/function-matrix\"><span style=\"font-weight: 400;\">many data manipulation functions<\/span><\/a><span style=\"font-weight: 400;\"> that can be performed and combined in a single job script and I\/O pass. Process optimization and consolidation are just a few ways that IRI users can <\/span><a href=\"http:\/\/iri.com\/resourceViewer\/pdf\/dbta\/IRI_Embracing_Velocity_with_Voracity_DBTA\"><span style=\"font-weight: 400;\">accelerate data movement and management<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, multiple, multi-function task blocks like this one can be part of larger diagrammed workflows that IRI Workbench automatically serializes into Unix or Windows batch scripts. You can launch or schedule individual task scripts or batch jobs to run from Workbench, or execute them from your own command line, application, or automation tool.<\/span><\/p>\n<p><a href=\"https:\/\/www.iri.com\/company\/contact\"><span style=\"font-weight: 400;\">Contact<\/span><\/a><span style=\"font-weight: 400;\"> your IRI representative if you need help connecting or managing data from Snowflake.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Finding and masking personally identifiable information (PII) in Snowflake\u00ae data warehouses works the same way in IRI FieldShield\u00ae or Voracity\u00ae installations as it does for other relational database sources. This article shows how I masked some of the columns in an online table after connecting my Snowflake warehouse in AWS to IRI Workbench. IRI Workbench\u2122<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\" title=\"Masking &#038; Mapping Data in a Snowflake Database\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":18478,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[108,8,1,776],"tags":[25,654,14,13,782,100,1365,1376],"class_list":["post-12458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data-2","category-data-protection","category-data-transformation2","category-etl","tag-big-data","tag-data-mapping","tag-data-masking","tag-data-protection-2","tag-databases","tag-etl","tag-snowflake","tag-snowflake-etl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking &amp; Mapping Data in a Snowflake Database - IRI<\/title>\n<meta name=\"description\" content=\"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking &amp; Mapping Data in a Snowflake Database\" \/>\n<meta property=\"og:description\" content=\"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-23T16:36:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T15:26:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"Masking &#038; Mapping Data in a Snowflake Database\",\"datePublished\":\"2021-09-23T16:36:23+00:00\",\"dateModified\":\"2025-07-28T15:26:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\"},\"wordCount\":473,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png\",\"keywords\":[\"big data\",\"data mapping\",\"data masking\",\"data protection\",\"databases\",\"ETL\",\"snowflake\",\"snowflake etl\"],\"articleSection\":[\"Big Data\",\"Data Masking\/Protection\",\"Data Transformation\",\"ETL\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\",\"name\":\"Masking & Mapping Data in a Snowflake Database - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png\",\"datePublished\":\"2021-09-23T16:36:23+00:00\",\"dateModified\":\"2025-07-28T15:26:46+00:00\",\"description\":\"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking &#038; Mapping Data in a Snowflake Database\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking & Mapping Data in a Snowflake Database - IRI","description":"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/","og_locale":"en_US","og_type":"article","og_title":"Masking & Mapping Data in a Snowflake Database","og_description":"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/","og_site_name":"IRI","article_published_time":"2021-09-23T16:36:23+00:00","article_modified_time":"2025-07-28T15:26:46+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/"},"author":{"name":"Donna Davis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"Masking &#038; Mapping Data in a Snowflake Database","datePublished":"2021-09-23T16:36:23+00:00","dateModified":"2025-07-28T15:26:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/"},"wordCount":473,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","keywords":["big data","data mapping","data masking","data protection","databases","ETL","snowflake","snowflake etl"],"articleSection":["Big Data","Data Masking\/Protection","Data Transformation","ETL"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/","name":"Masking & Mapping Data in a Snowflake Database - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","datePublished":"2021-09-23T16:36:23+00:00","dateModified":"2025-07-28T15:26:46+00:00","description":"Learn how to mask personally identifiable information in Snowflake data warehouses using IRI FieldShield and Workbench.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-mapping-data-in-a-snowflake-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking &#038; Mapping Data in a Snowflake Database"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/www.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/09\/featured-image-snowflake-database.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12458"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=12458"}],"version-history":[{"count":12,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12458\/revisions"}],"predecessor-version":[{"id":18479,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/12458\/revisions\/18479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18478"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=12458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=12458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=12458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}