Tokenization Access Policies
ALTR's tokenization access policies enable you to use ALTR's access control engine to dictate which users are able to detokenize sensitive data.
Adding an extra layer of security before enabling certain roles to access your tokenized data and then applying an ALTR detokenization policy is beneficial to your data governance strategy. While tokenization is the process of converting your sensitive data with "substitutes" that are "tokens" the human eye can’t read or figure out, detokenization is the opposite process. Detokenization functions by removing non-sensitive token identifiers for your Snowflake columns and object tags and converting the them back to the original value where there are no token identifiers. When you use ALTR to apply a detokenization policy for a Snowflake column or object tag, the original value is returned to authorized users.
For example, an application can require a person's date of birth to generate monthly patient invoices for recurring medical services (such as ongoing treatments to treat an illness) that their medical provider has rendered. Detokenized sensitive data must be read under strict security controls.
Prerequisites
To apply an ALTR detokenization policy for your Snowflake column or object tag, ensure you have
An ALTR account with access to tokenization.
A Snowflake column of data that has been tokenized or a tag associated with tokenized data.
A data source that's connected to ALTR.
Manually labeled (in the ALTR UI or the API) the columns or object tags that contain tokens.
Detokenization Policy Objective and Key Benefits
While tokenization replaces sensitive data with a substitute (that is, a token) to provide an extra layer of protection, detokenization is the reverse process. The objective of using ALTR to apply a detokenization policy is for you to control who can access the original values of your sensitive data versus the tokenized ones.
If your data has already been tokenized via an ETL process through Matillion, then by default, you only have access to tokenized columns and tags through ALTR; however, if you choose to apply a masking policy option, then you can select which roles can access the original detokenized values. A "Masked" policy option enables you to select the roles that can access masked detokenized values.
In short, by applying our detokenization policy you can
Leverage your secure tokenized data in Snowflake by setting a policy of specific roles that can see the underlying values.
Elevate your security strategy to mitigate data breaches and other risks.
What to Consider Before Applying the Policy
Before you apply a detokenization policy, keep the following considerations in mind:
Make sure the Tokenized check box is selected on the tokenized column/tag.
Be very careful to assign this policy to the role(s) that should be able to access the original value.
If you've failed to label the column/tag as containing tokens (and only selected the "No Mask" option), then you'll only see the token values.
Note
ALTR recommends that you apply separate policies for tokenized and non-tokenized data.
Considerations Specifically for Tag-Based Detokenizations
The following considerations are specifically for tag-based detokenization:
Only columns that are VARCHAR and minimum length of 71 characters are supported.
Ensure tags that are labeled as "tokenized" actually contain tokens.
Example
Let's say an admin logs into ALTR and performs the following actions on tags where only the email
tag value contains tokens:
connects a tag (indicated as tokenized) name
PII
with the valuesemail
,name
,address
puts a lock/policy with no mask on the
email
tag value (only admin can view detokenized no-mask values)puts a lock/policy with no mask on the
name
tag value
This scenario introduces a few risks:
If a non-admin user without proper privileges tries to query
email
, they will see tokens.If a non-admin user without proper privileges tries to query
name
, they will see the original value (as opposed to NULLs in a governed tag that is not indicated as tokenized))
Likewise, if there's an active alert for user X and user X tries to
query
email
, they will see tokens.query
name
, they will see the original value (as opposed to NULLs in a governed tag).
Configure Columns or Tags for Role-Based Detokenization
To control access to detokenized data using ALTR, the columns or tags must be previously tokenized through our API or third-party integration.
To configure columns or tags for role-based detokenization:
Connect a column/tag to ALTR and select the "Tokenized" check box. Refer to Connecting Columns / Connecting Tags for more information.
Apply access policies to the tokenized column/tag. By default, queries against policies only return tokens. Creating policies with the "No Mask" option returns the original value for the specified roles. Creating policies with masking options returns masked detokenized data for the specified roles.