{"id":18610,"date":"2025-09-30T15:57:17","date_gmt":"2025-09-30T19:57:17","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=18610"},"modified":"2025-10-03T14:08:22","modified_gmt":"2025-10-03T18:08:22","slug":"masking-pii-in-sql-files","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/","title":{"rendered":"Masking PII in SQL Files"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One of the most common targets for PII theft is data within databases. This blog is replete with examples of how to find and mask that PII residing in the schema of production or test databases using <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/how-to-mask-pii-in-a-database\/\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-relational-databases-with-the-darkshield-rdb-wizard\/\"><span style=\"font-weight: 400;\">DarkShield<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A more obscure, but still potentially vulnerable source of database PII resides .sql dump files. SQL dump files are the result of exporting the contents and metadata of a database that are then saved as SQL statements in a text file.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The primary purpose of SQL dumps is backup and recovery, migrating between systems, and data provisioning for testing. When data from a production database is exported and dumped into a .sql file, a new vector for accessing the PII contained in that database is created.<\/span><\/p>\n<p>Several high-profile incidents highlight how dangerous unsecured SQL files can be:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18619 alignright\" style=\"text-align: center;\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/SQL-data-leaks-300x280.png\" alt=\"\" width=\"278\" height=\"259\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/SQL-data-leaks-300x280.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/SQL-data-leaks-768x717.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/SQL-data-leaks.png 950w\" sizes=\"(max-width: 278px) 100vw, 278px\" \/><\/p>\n<ul>\n<li data-start=\"1050\" data-end=\"1183\">\n<p data-start=\"1052\" data-end=\"1183\"><strong data-start=\"1052\" data-end=\"1093\">Navy Federal Credit Union (May 2024):<\/strong> 378 GB of unencrypted SQL backups were left publicly accessible in an Amazon S3 bucket.<\/p>\n<\/li>\n<li data-start=\"1050\" data-end=\"1183\">\n<p data-start=\"1052\" data-end=\"1183\"><strong data-start=\"1186\" data-end=\"1207\">BigBasket (2020):<\/strong> The Indian online grocer\u00a0<span style=\"font-weight: 400;\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">experienced a large data leak, believed to include compromised SQL exports (or SQL\u00a0<\/span>injection)<\/span>.<\/p>\n<\/li>\n<li data-start=\"1302\" data-end=\"1404\">\n<p data-start=\"1304\" data-end=\"1404\"><strong data-start=\"1304\" data-end=\"1325\">A tech news site, BGR India (2020):<\/strong> Unsecured AWS S3 buckets exposed SQL backups of its WordPress site database.<\/p>\n<\/li>\n<li data-start=\"1405\" data-end=\"1513\">\n<p data-start=\"1407\" data-end=\"1513\"><strong data-start=\"1407\" data-end=\"1450\">A mining company in Indonesia, Karunia Group (August 2025):<\/strong> SQL dumps from the company\u2019s internal HR system were leaked.<\/p>\n<\/li>\n<\/ul>\n<h5><b>DarkShield .SQL File Support<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">In the latest release of <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><span style=\"font-weight: 400;\">, .sql files are now supported for data discovery and masking. The ability to handle .sql files in DarkShield gives users the ability to mask sensitive data in backup files when it is not possible to allow DarkShield access to the database directly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Handling .sql files is done no differently than any other type of file in a DarkShield Job. Just be sure to indicate this file type among any others that DarkShield will search and mask from the defined on-premise and\/or cloud folders it reads.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18613\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Dark-data-connection-wizard-298x300.png\" alt=\"\" width=\"487\" height=\"490\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Dark-data-connection-wizard-298x300.png 298w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Dark-data-connection-wizard-150x150.png 150w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Dark-data-connection-wizard-70x70.png 70w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Dark-data-connection-wizard.png 504w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To learn how to create a DarkShield File job from the Workbench GUI, read this <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-files-with-the-darkshield-files-wizard\/\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\"> or watch this <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=-feeDkpalmw&amp;list=PL7nHBVSFkLEBsSYTQ_BLETXyUbB6Pe_2O\"><span style=\"font-weight: 400;\">video<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h5><b>Before DarkShield<\/b><\/h5>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18614\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/before-darkshield-300x139.png\" alt=\"\" width=\"725\" height=\"336\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/before-darkshield-300x139.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/before-darkshield.png 760w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/p>\n<h5><b>After DarkShield<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">This example shows the application of <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encrypt\/overview\"><span style=\"font-weight: 400;\">format-preserving encryption<\/span><\/a><span style=\"font-weight: 400;\"> (one of many available, <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\">data-class-specific<\/a> IRI masking <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\">functions<\/a>) on the name, email and phone number values in the insert statements:<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18615\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/after-darkshield-300x114.png\" alt=\"\" width=\"750\" height=\"285\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/after-darkshield-300x114.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/after-darkshield-768x293.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/after-darkshield.png 771w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For help with data classification (discovery) and masking of PII or other sensitive data in SQL files (or other sources \u2013 structured, semi-structured, or unstructured), please email <\/span><a href=\"mailto:darkshield@iri.com\"><span style=\"font-weight: 400;\">darkshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most common targets for PII theft is data within databases. This blog is replete with examples of how to find and mask that PII residing in the schema of production or test databases using IRI FieldShield or DarkShield. A more obscure, but still potentially vulnerable source of database PII resides .sql dump<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\" title=\"Masking PII in SQL Files\">Read More<\/a><\/div>\n","protected":false},"author":152,"featured_media":18620,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[2133,1386,206,2203,1305,13,2199,98,2206,2205,1306,1737,2198,2204,2207,2197,2200],"class_list":["post-18610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-cloud-data-security","tag-darkshield","tag-data-breach-prevention","tag-data-masking-functions","tag-data-masking-tools","tag-data-protection-2","tag-database-backup-risks","tag-format-preserving-encryption","tag-masking-pii-in-sql","tag-pii-in-sql-files","tag-pii-masking","tag-sensitive-data-discovery","tag-sql-dump-files","tag-sql-file-masking","tag-sql-file-protection","tag-sql-file-security","tag-unsecured-sql-backups"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking PII in SQL Files - IRI<\/title>\n<meta name=\"description\" content=\"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking PII in SQL Files\" \/>\n<meta property=\"og:description\" content=\"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T19:57:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T18:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\"},\"author\":{\"name\":\"Adam Lewis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\"},\"headline\":\"Masking PII in SQL Files\",\"datePublished\":\"2025-09-30T19:57:17+00:00\",\"dateModified\":\"2025-10-03T18:08:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\"},\"wordCount\":396,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png\",\"keywords\":[\"Cloud Data Security\",\"DarkShield\",\"data breach prevention\",\"data masking functions\",\"data masking tools\",\"data protection\",\"Database backup risks\",\"format-preserving encryption\",\"masking PII in .SQL\",\"PII in SQL files\",\"pii masking\",\"sensitive data discovery\",\"SQL dump files\",\"SQL file masking\",\"SQL file protection\",\"SQL file security\",\"Unsecured SQL backups\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\",\"name\":\"Masking PII in SQL Files - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png\",\"datePublished\":\"2025-09-30T19:57:17+00:00\",\"dateModified\":\"2025-10-03T18:08:22+00:00\",\"description\":\"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking PII in SQL Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\",\"name\":\"Adam Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"caption\":\"Adam Lewis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/adaml\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking PII in SQL Files - IRI","description":"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/","og_locale":"en_US","og_type":"article","og_title":"Masking PII in SQL Files","og_description":"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/","og_site_name":"IRI","article_published_time":"2025-09-30T19:57:17+00:00","article_modified_time":"2025-10-03T18:08:22+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","type":"image\/png"}],"author":"Adam Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Lewis","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/"},"author":{"name":"Adam Lewis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e"},"headline":"Masking PII in SQL Files","datePublished":"2025-09-30T19:57:17+00:00","dateModified":"2025-10-03T18:08:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/"},"wordCount":396,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","keywords":["Cloud Data Security","DarkShield","data breach prevention","data masking functions","data masking tools","data protection","Database backup risks","format-preserving encryption","masking PII in .SQL","PII in SQL files","pii masking","sensitive data discovery","SQL dump files","SQL file masking","SQL file protection","SQL file security","Unsecured SQL backups"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/","name":"Masking PII in SQL Files - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","datePublished":"2025-09-30T19:57:17+00:00","dateModified":"2025-10-03T18:08:22+00:00","description":"See how the IRI DarkShield data masking tool can find and protect PII not only in relational database tables, but in SQL files creating them.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-sql-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking PII in SQL Files"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e","name":"Adam Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","caption":"Adam Lewis"},"url":"https:\/\/www.iri.com\/blog\/author\/adaml\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/09\/Masking-PII-in-SQL-files-.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18610"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=18610"}],"version-history":[{"count":8,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18610\/revisions"}],"predecessor-version":[{"id":18639,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18610\/revisions\/18639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18620"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=18610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=18610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=18610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}