User Guide: Privacera Encryption Integration with Vertica¶
This user guide explains how to integrate Privacera Encryption with Vertica to enable encryption, decryption, and data masking. It provides step-by-step instructions to help you configure and use these features effectively. - Database: Customer_DB - Schema: Customer_Schema - Table: Customer_Data - User: Sally - Admin User: dbadmin (used to create encrypted tables)
Prerequisites¶
- Running Vertica Cluster Single Node or Multi Node.
- Privacera Encryption must be enabled and Integrated in the Vertica cluster.
- Vertica version 12.0.x.
- Sally belongs to group
PEG_GROUP. PEG_GROUPis assigned the rolePEG_ROLE.- Group and Role creation: Vertica Group & Role Documentation
1. Stop Existing Vertica Database¶
To create a new database, stop the currently running one:
2. Create a New Database¶
Use either Command Line or Admin Tool.
Command Line: vsql CLI Usage
Admin Tool: AdminTools Usage
3. Login to vsql¶
| Bash | |
|---|---|
4. Create Schema and Table¶
5. Insert Sample Data¶
Warning
- This data is fictional and used for demonstration purposes only.
- Any resemblance to real individuals is purely coincidental.
6. Create System and Custom Schemes¶
6.1. Create System Schemes (Encryption, Presentation)¶
- Log in to the Privacera Portal
- Navigate to Encryption & Masking > Encryption & Masking
- Click Generate System Scheme
- Confirm the creation by clicking Yes
- System schemes will be created for:
EncryptionPresentation
- Review the list of default system schemes
6.2. Create Custom Schemes (Encryption, Presentation, Masking)¶
- Navigate to Encryption & Masking > Encryption & Masking
- Click Add Scheme
- Select the scheme type:
Encryption,Presentation, orMasking - Enter the required details and click Save
11. Create Encrypted Table (as dbadmin)¶
11.1. Encrypt the Data¶
Expected Error (Before Policy Applied):
| Bash | |
|---|---|
In Self-Managed environments, Access Audits can be viewed by navigating to: Access Management > Audits > Access
11.2. Create Scheme Policy for dbadmin¶
- Navigate to Access Management > Scheme Policies
- Click Add Scheme Policy
- Enter Protect Access for dbadmin as the Policy Name.
- Under Schemes, select the following:
- SYSTEM_SSN
- SYSTEM_EMAIL
- SYSTEM_CREDITCARD
- SYSTEM_ADDRESS
- In the Users section, select dbadmin.
- Set Permissions to Protect.
- Click Save to create the policy.
11.3. Run the Encryption Query Again¶
11.4 Verify:¶
| SQL | |
|---|---|
12. Decrypt the Data (as Sally)¶
12.1 Grant SELECT to Sally¶
| SQL | |
|---|---|
12.2 Create UnProtect Scheme Policy for Sally:¶
- Navigate to Access Management > Scheme Policies
- Click on Add Scheme Policy
- Policy Name: Unprotect Access
- Schemes: SYSTEM_SSN, SYSTEM_EMAIL, SYSTEM_CREDITCARD, SYSTEM_ADDRESS
- Select PEG_ROLE in the Role section
- Permissions:
- Unprotect
- Click Save
12.3 Run the following query to decrypt the data:¶
| SQL | |
|---|---|
13 Obfuscate the Data¶
13.1 Policy: Presentation Access¶
- Policy Name:
Presentation Access - Encryption Schemes:
System_SSN,SYSTEM_EMAIL,SYSTEM_CREDITCARD,SYSTEM_ADDRESS- Presentation Schemes:
SYSTEM_PRESENTATION_SSN,SYSTEM_PRESENTATION_EMAIL,SYSTEM_PRESENTATION_CREDITCARD,SYSTEM_PRESENTATION_ADDRESS- Allow:
- Role:
PEG_ROLE - Permission:
Unprotect
13.2 SQL to Obfuscate Data¶
14. Mask the Data¶
14.1 Policy: Mask Access¶
- Policy Name:
Mask Access - Masking Schemes:
MASK_SSN,MASK_EMAIL,MASK_ADDRESS - Allow:
- Role:
PEG_ROLE - Permission:
MASK