Self-led training Module 2 - Data Masking - Introduction
Masking databases with Curiosity Software
Introduction
Data masking involves replacing sensitive information in databases with fabricated, yet realistic data, thereby protecting the actual data while still enabling the use of the database system for various tasks such as software testing, development, user training, or data analysis. This ensures sensitive data, including Personally Identifiable Information (PII) and commercially sensitive data, remains inaccessible to unauthorised users, minimising the risk of data breaches especially during non-production activities where full security measures may not be implemented.
Additionally, database masking is crucial for regulatory compliance, as many industries are subject to regulations like HIPAA, PCI DSS, and GDPR that mandate the protection of sensitive customer data. Non-compliance can result in substantial fines and reputational damage, making database masking essential for businesses to meet these requirements and protect stakeholders.
Training Overview:

This training course will take you through the journey of creating a data masking activity using a data dictionary and connection which have already been scanned with PII identified. This is shown visually below as a process diagram:
By the end of this self-led training you will be able to:
- Mask a database
- Mask multiple databases keeping referential integrity
- Expose masking routines to be run how you would like
Prerequisites for the Masking training course:
For this data activity, you will need:
-
To identify your PII (Please see the Profiling training in this series for guidance)
Please take a moment to familiarise yourself with the prerequisites and make sure you are set up and ready to go.
Before you begin:
- Please download a copy of the Data Masking - Self-led training guide, which will act as your workbook for the training.
- Confirm your progress through each section in the training form and submit at the end of your training, to ensure you receive your certificate of completion. The training form is here.
This training module should take approximately 1/2 a day to complete. The training is structured into 4 key sections, each with exercises to complete based on the steps provided in the guide. There are 5 exercises in total. The structure is as follows, and the training should be completed in order from Section 1 through to Section 4:
You can find the solutions to each exercise in the 'Exercise Solutions' page of this training course.
Proceed to Section 1 - Create and configure a data masking activity >