Comments
2 comments
-
Hi Elise,
Thank you for your forum post.
I am not aware of documentation specific to best practices. To answer your questions, I hope the following documents help you:
What strategies or features have you found most effective for masking or anonymizing sensitive data?
This document is an explanation of the Anonymizer tool and the 3 steps, Classify, Map and masking: Classify to identify sensitive data which generates a classification file. Using the classification file to Map a set of instruction for masking which generates a masking file. Finally Masking which uses the masking file to run the anonymization process.
This document explains the Deterministic Data Masking process.
This document is how to get started with cloning in Test Data Manager.
How do you automate test data refreshes across development and QA environments?
Using the Anonymizer and redgate Clone, both include a CLI. You can then run commands via a scheduler to refresh environments.
Are there any pitfalls or best practices you can share for staying compliant?
As I highlighted above at the beginning of my reply, there are no best practices documentation. The links I provided above will help in regards to best practices. Plus there is the help documentation for Test Data Manger, redgate Clone and Product Learning resources.
I recommend that you contact your Redgate Sales AE if you need help setting up your POC or require product training or guided installation via Redgate's Professional Services team.
Or if you have encountered a technical problem you need help upon, please submit a support request via the support portal or email support@red-gate.com.
Many Thanks
Eddie Davis
Senior Product Support Engineer
Product Support Team
Redgate Software Limited -
Thanks, Eddie, appreciate the detailed response. The breakdown of Classify → Map → Mask helps wrap our heads around the process. We’ll dig into the CLI options too since automation is a big part of what we’re aiming for. If we run into anything specific during setup, we’ll reach out through support. Thanks again!
Add comment
Please sign in to leave a comment.
Hello Redgate Community,
We’re currently in the process of improving our test environments and want to ensure that sensitive data is handled securely and efficiently. We’re using Redgate’s Test Data Management tools to generate and manage test data, but we’re facing some challenges around:
I’d love to hear how others are approaching these challenges using Redgate’s solutions. Specifically:
Looking forward to your insights and recommendations!
Thanks
Elise