{"id":17670,"date":"2024-07-09T19:07:01","date_gmt":"2024-07-09T23:07:01","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=17670"},"modified":"2025-11-12T05:38:09","modified_gmt":"2025-11-12T10:38:09","slug":"how-to-mask-pii-in-a-database","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/","title":{"rendered":"How to Mask PII in a Database"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">First released in 2011, the <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> database data masking tool helps you <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">classify, find, and de-identify<\/span><\/a><span style=\"font-weight: 400;\"> personally identifiable information (PII) or other sensitive data in structured relational database (RDB) sources. FieldShield also supports fixed and delimited files, flat XML and JSON, Excel, and ASN.1 CDR files. IRI <\/span><i><span style=\"font-weight: 400;\">DarkShield<\/span><\/i><span style=\"font-weight: 400;\"> supports RDBs and other sources, too. <span id='easy-footnote-1-17670' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#easy-footnote-bottom-1-17670' title='\u00a0&lt;em&gt;If you have semi-structured or unstructured data in your RDB, or you are interested in finding and masking PII in NoSQL DBs, EDI files, PDF and MS documents, or image files, check out &lt;a href=&quot;https:\/\/www.iri.com\/products\/darkshield&quot;&gt;IRI DarkShield&lt;\/a&gt;. DarkShield uses the same GUI, data classes, and masking rules as FieldShield to provide data integrity on-premise or in the cloud enterprise wide. You can also use &lt;a href=&quot;https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-relational-databases-with-the-darkshield-rdb-wizard\/&quot;&gt;DarkShield for RDB&lt;\/a&gt; sources as well; see &lt;a href=&quot;https:\/\/www.iri.com\/company\/faqs\/190&quot;&gt;this FAQ&lt;\/a&gt; for guidance vs. FieldShield.&lt;\/em&gt;'><sup>1<\/sup><\/a><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article only summarizes the steps <\/span><i><span style=\"font-weight: 400;\">FieldShield<\/span><\/i><span style=\"font-weight: 400;\"> users normally take to connect to, classify, discover, mask, and audit PII in a relational database. Below you will see links to other articles in the IRI blog which detail each of these steps. <span id='easy-footnote-2-17670' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#easy-footnote-bottom-2-17670' title='\u00a0&lt;i&gt;There is also help within the IRI Workbench &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/products\/workbench\/fieldshield-gui&quot;&gt;&lt;i&gt;GUI&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt; for FieldShield, &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.youtube.com\/playlist?list=PL7nHBVSFkLEAhaZ6HeMRuVKE273Xl-unC&quot;&gt;&lt;i&gt;YouTube videos&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt;, and product manual. Self-directed and IRI-supervised &lt;\/i&gt;&lt;a href=&quot;https:\/\/www.iri.com\/services\/training&quot;&gt;&lt;i&gt;learning services&lt;\/i&gt;&lt;\/a&gt;&lt;i&gt; are also available to expedite your solution.&lt;\/i&gt;'><sup>2<\/sup><\/a><\/span><\/span><\/p>\n<p><strong>This diagram represents the most common workflow:<\/strong><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17675\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-209x300.png\" alt=\"\" width=\"495\" height=\"710\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-209x300.png 209w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow.png 713w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Common-workflow-768x1103.png 768w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/p>\n<h4><b>Step-by-Step<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">By way of more detail, FieldShield users typically follow these steps:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17682\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-256x300.png\" alt=\"\" width=\"604\" height=\"708\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-256x300.png 256w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1.png 875w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-768x899.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-1312x1536.png 1312w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Step-by-step-Fieldshield-1-1749x2048.png 1749w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">1. Once you have installed <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">, and licensed the FieldShield masking <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">executable<\/span><\/a><span style=\"font-weight: 400;\">, make both JDBC and ODBC <\/span><a href=\"https:\/\/www.iri.com\/services\/training\/courseware#db-connections\"><span style=\"font-weight: 400;\">connections<\/span><\/a><span style=\"font-weight: 400;\"> to each database to be masked. For files, identify local or remote folder locations.<\/span><\/p>\n<p>2. Use wizards in the <a href=\"https:\/\/www.iri.com\/products\/workbench\/discover-data\">data discovery<\/a> menu to profile your data sources, build E-R diagrams to model RDB schema, perform referential integrity checks, and search for specific items matching a pattern. You can find much more however using data classification (see below).<\/p>\n<p>3. <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\">Define data classes<\/a> (e.g., passport #, name, phone), or class groups (e.g., citizen PII) as needed, and assign to them search methods and masking functions. Then run the search wizard for your <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/schema-data-class-search-2\/\">DB schema<\/a> (or <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/directory-data-class-search-wizard\/\">file folders<\/a>). The search jobs produce log reports, <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-discovery-charts-iri-workbench\/\">dashboard charts<\/a>, and a <a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/data-class-mapping-in-iri-workbench\/\">Data Class Map<\/a> you can review <i>before <\/i>the bulk data masking wizards use it to consistently apply your rules to your data classes (which ensures referential integrity).<\/p>\n<p><span style=\"font-weight: 400;\">4. Run the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-a-relational-db-with-fieldshield\/\"><i><span style=\"font-weight: 400;\">New Data Class Map <\/span><\/i><span style=\"font-weight: 400;\">DB<\/span><i><span style=\"font-weight: 400;\"> Masking Job &#8230;<\/span><\/i><\/a><span style=\"font-weight: 400;\"> or the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-flat-files-in-the-fieldshield-gui\/\"><i><span style=\"font-weight: 400;\">New Data Class Map<\/span><\/i><span style=\"font-weight: 400;\"> File <\/span><span style=\"font-weight: 400;\">Masking<\/span><i><span style=\"font-weight: 400;\"> Job \u2026<\/span><\/i><\/a><span style=\"font-weight: 400;\"> wizard. You will apply a default or chosen <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">data masking function<\/span><\/a><span style=\"font-weight: 400;\"> for each data class <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-function-use\/\"><span style=\"font-weight: 400;\">based on<\/span><\/a><span style=\"font-weight: 400;\"> its need for reversibility, realism, uniqueness, consistency, and security. You can also configure these data masking jobs in mapping diagrams, 4GL scripts, or an IRI API.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">5. Jobs once created are easily run and modified for iterative testing, where output can first be virtualized to the console, file or sample tables for review, modification, sharing, and re-use. SQL query and update logic can be inside scripts or workflows for <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/real-time-incremental-data-masking\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=real-time-incremental-data-masking\"><span style=\"font-weight: 400;\">real time<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.iri.com\/blog\/etl\/incremental-data-masking-and-mapping\/\"><span style=\"font-weight: 400;\">incremental<\/span><\/a><span style=\"font-weight: 400;\"> masking jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6. An included <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/hipaa-re-id-risk-scoring\/\"><span style=\"font-weight: 400;\">risk-scoring wizard<\/span><\/a><span style=\"font-weight: 400;\"> statistically measures the likelihood that a masked data set (table) can still be used to identify an individual based on quasi-identifying information in the row.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7. Further masking jobs can address the risks exposed in the scoring report by <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/blur\"><span style=\"font-weight: 400;\">blurring or bucketing<\/span><\/a><span style=\"font-weight: 400;\"> quasi-identifying values like birthdate and age. These techniques render the data anonymous, but still fit for purpose.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">8. As you gain success and confidence in the above processes, and begin to satisfy production data masking needs, you should also take stock of your job performance and metadata assets (source layouts, task and batch scripts, encryption keys, etc.). Use an IRI Workbench plugin like <\/span><a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/introduction-metadata-management-hub\/\"><span style=\"font-weight: 400;\">Git<\/span><\/a><span style=\"font-weight: 400;\"> to secure, share, version control, and track changes to your metadata.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">9. During and after the go-live dates, follow IRI recommendations to monitor performance, manage updates to data, conditions and software and address new use cases or audit requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can mask data in your production or test schema; you define the sources, targets, and flow. The most common is ETL; i.e., read from production, masking in the engine and writing to test.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Watch this video of a typical job: <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=ALwQA9OigK8&amp;ab_channel=IRI-TotalDataManagement\"><span style=\"font-weight: 400;\">https:\/\/www.youtube.com\/watch?v=ALwQA9OigK8&amp;ab_channel=IRI-TotalDataManagement<\/span><\/a><\/p>\n<h4><b>What\u2019s Next?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">After FieldShield masking is performed, you can also:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Validate the results in your target tables for privacy, realism, and referential integrity<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Audit the discovery (search), data masking job, and performance logs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate the batch via the IRI (or your) job scheduler or integrate it into a CI\/CD pipeline<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perform <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/hipaa-re-id-risk-scoring\/\">re-ID risk-scoring<\/a> (usually for HIPAA expert determination method compliance)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Build and run additional anonymization jobs to further obscure quasi-identifiers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Add additional targets, filters, transforms, DQ functions, or formatting to any of the jobs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use its data classes and masking rules in a <a href=\"https:\/\/www.iri.com\/blog\/vldb-operations\/iris-new-database-subsetting-wizard\/\">DB subsetting<\/a>, <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/real-time-incremental-data-masking\/\">Ripcurrrent<\/a>, or DarkShield job<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Share, version control, change-track and otherwise secure any job artifacts in Git<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you have any questions or need help masking your database, email <\/span><a href=\"mailto:fieldshield@iri.com\"><span style=\"font-weight: 400;\">fieldshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<section>\n<div class=\"container plain-width\">\n<div class=\"faq-section\">\n<h3>Frequently Asked Questions (FAQs)<\/h3>\n<div class=\"faq-item\">\n<div class=\"faq-question\">1. What is PII and why does it need to be masked in a database? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Personally Identifiable Information (PII) includes data like names, SSNs, phone numbers, and other attributes that can identify an individual. Masking PII in a database is crucial to protect privacy, prevent breaches, and meet regulatory requirements like HIPAA and the GDPR.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">2. How does IRI FieldShield help mask PII in relational databases? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">IRI FieldShield classifies, discovers, re-ID risk scores, and de-identifies PII in structured relational databases. It uses data classes and masking rules to locate and consistently replace sensitive values while preserving referential integrity in the target (masked) tables.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">3. How do I connect FieldShield to my database? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">You can connect FieldShield to your database by setting up JDBC and ODBC connections within IRI Workbench. These connections allow the wizards to profile, classify, and mask data directly from (and to) any connected DB instance.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">4. What are data classes and how are they used in masking? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Data classes represent categories of sensitive information, such as passport numbers or email addresses. Each data class is assigned search methods and masking rules so that any instance of that class is discovered and masked with the same function (consistently).<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">5. How can I ensure referential integrity during masking? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">FieldShield\u2019s data class mapping ensures that identical values across tables receive the same masked value. Deterministic functions like format-preserving encryption or consistent pseudonymization maintain referential integrity.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">6. What masking functions can I apply to database fields? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">You can choose from a wide range of <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\">static data masking functions<\/a>, including: encryption, hashing, pseudonymization, randomization, redaction, blurring, and bucketing. The function you choose depends on whether you need reversibility, realism, or complete anonymization.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">7. How can I validate and audit the results after masking? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">FieldShield provides discovery logs, job execution logs, and audit trails. You can also run re-ID risk scoring to statistically measure whether the masked data still carries re-identification risks.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">8. How do I run a database masking job in FieldShield? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">After creating a Data Class Map, use the \u201c<a href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-a-relational-db-with-fieldshield\/\">New Data Class Map DB Masking Job<\/a>\u201d wizard in IRI Workbench. Configure the sources, targets, and masking functions, then run the job directly from the GUI or via command line.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">9. Can I mask data incrementally or in real time? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. You can apply FieldShield masking rules into real-time test schema refreshes via the IRI <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/real-time-data-masking\">Ripcurrent CDC module<\/a> in Voracity during RDB data replication. You can also apply FieldShield functions in Voracity ETL (CoSort SortCL) jobs with data\/value-based condition evaluations, and embed those jobs into real-time applications, CI\/CD pipelines or data virtualization layers.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">10. How can I address residual re-identification risks? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Use FieldShield\u2019s re-ID risk-scoring wizard to detect quasi-identifiers that could still expose identities. Then create additional masking jobs using blurring, bucketing, or generalization functions to further anonymize the data.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">11. Can FieldShield be integrated with other IRI tools? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. FieldShield data classes and masking functions can also be used in IRI database subsetting jobs, Ripcurrent replication, Voracity ETL jobs, and with the DarkShield API as a field-level function call to handle semi-structured and unstructured data in RDB columns.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">12. What are the options for automating FieldShield jobs? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">FieldShield jobs can run from the GUI, command line or API call. You can automate FieldShield using the built-in task scheduler in IRI Workbench or integrate them into your own job scheduling tool, batch script, or CI\/CD (DevOps) pipeline. This helps maintain compliance in ongoing production and test environments.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">13. How does FieldShield support compliance with data privacy laws? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">FieldShield helps organizations comply with GDPR, HIPAA, CPRA, PCI DSS, and other regulations by finding PII, applying appropriate de-identification techniques, and producing auditable logs to prove compliance. FieldShield also supports DSARs for values stored in structured RDBs, Excel sheets, ASN.1-encoded Call Detail Record (CDR) files, and flat (fixed or delimited text) files, including the rights to rectification, portability and erasure.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">14. Can I secure and share FieldShield jobs with my team? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">Yes. You can use version control systems <a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/sharing-iri-data-management-jobs-via-git\/\">like Git<\/a> directly from IRI Workbench to secure, share, and track changes to your job scripts, metadata, and encryption keys.<\/div>\n<\/div>\n<div class=\"faq-item\">\n<div class=\"faq-question\">15. How do I get help if I have questions about database masking? <i class=\"faq-icon fa fa-plus\"><\/i><i class=\"faq-icon fa fa-minus\"><\/i><\/div>\n<div class=\"faq-answer\">You can access built-in help in IRI Workbench, watch YouTube tutorials, or peruse IRI\u2019s other self-directed learning <a href=\"https:\/\/www.iri.com\/services\/training\/courseware\">resources<\/a>. For direct assistance, you can email fieldshield@iri.com to get expert support.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>First released in 2011, the IRI FieldShield database data masking tool helps you classify, find, and de-identify personally identifiable information (PII) or other sensitive data in structured relational database (RDB) sources. FieldShield also supports fixed and delimited files, flat XML and JSON, Excel, and ASN.1 CDR files. IRI DarkShield supports RDBs and other sources, too.<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\" title=\"How to Mask PII in a Database\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":17686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[1818,1081,280,14,1817,1816,1305,18,17,15,1819,520,1815,2220,1368,152],"class_list":["post-17670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-data-anonymization-tool","tag-data-classification","tag-data-discovery","tag-data-masking","tag-data-masking-jobs","tag-data-masking-techniques","tag-data-masking-tools","tag-data-privacy","tag-data-protection-tool","tag-data-security","tag-database-anonymization","tag-iri-fieldshield","tag-pii-protection","tag-re-id-risk","tag-relational-databases","tag-sensitive-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Mask PII in a Database - IRI<\/title>\n<meta name=\"description\" content=\"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Mask PII in a Database\" \/>\n<meta property=\"og:description\" content=\"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T23:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T10:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"How to Mask PII in a Database\",\"datePublished\":\"2024-07-09T23:07:01+00:00\",\"dateModified\":\"2025-11-12T10:38:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\"},\"wordCount\":1537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"keywords\":[\"data anonymization tool\",\"data classification\",\"data discovery\",\"data masking\",\"Data Masking Jobs\",\"Data Masking Techniques\",\"data masking tools\",\"data privacy\",\"data protection tool\",\"data security\",\"database anonymization\",\"IRI FieldShield\",\"PII protection\",\"re-ID risk\",\"relational databases\",\"sensitive data\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\",\"name\":\"How to Mask PII in a Database - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"datePublished\":\"2024-07-09T23:07:01+00:00\",\"dateModified\":\"2025-11-12T10:38:09+00:00\",\"description\":\"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Mask PII in a Database\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Mask PII in a Database - IRI","description":"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/","og_locale":"en_US","og_type":"article","og_title":"How to Mask PII in a Database","og_description":"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/","og_site_name":"IRI","article_published_time":"2024-07-09T23:07:01+00:00","article_modified_time":"2025-11-12T10:38:09+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","type":"image\/png"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/"},"author":{"name":"David Friedland","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"How to Mask PII in a Database","datePublished":"2024-07-09T23:07:01+00:00","dateModified":"2025-11-12T10:38:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/"},"wordCount":1537,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","keywords":["data anonymization tool","data classification","data discovery","data masking","Data Masking Jobs","Data Masking Techniques","data masking tools","data privacy","data protection tool","data security","database anonymization","IRI FieldShield","PII protection","re-ID risk","relational databases","sensitive data"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/","name":"How to Mask PII in a Database - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","datePublished":"2024-07-09T23:07:01+00:00","dateModified":"2025-11-12T10:38:09+00:00","description":"Learn to classify, discover, and consistently mask PII in relational database(s) while preserving test data realism and referential integrity.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Mask PII in a Database"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/www.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/How-to-mask-PII-in-a-DB-2.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=17670"}],"version-history":[{"count":14,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670\/revisions"}],"predecessor-version":[{"id":18741,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17670\/revisions\/18741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/17686"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=17670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=17670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=17670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}