-
Notifications
You must be signed in to change notification settings - Fork 5.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Feature: Data Masking #10996
Comments
Do you mean column-level access control? Would you elaborate on your particular enterprise security requirements? |
Rather than throw an error if a user selects a columns that includes sensitive values. Would like that column to be returned as a random hash (just like Apache Ranger's Masking feature). This is so the same queries/data can be run in prod/dev envs without requiring SQL re-write and no sensitive values are shown in dev environment. |
It would be better if it can handle Dynamic Column masking offered in ranger+hive. |
Is there a Hive standard documented for this kind of behavior somewhere? BTW, we accomplished this at FB using views. |
@dain could views do this based on user or role? I will second this idea. Definitely very useful in enterprise use cases. I see that Starburst Presto, at least, integrates with Ranger but having this native in Presto would certainly be convenient. |
@aromero-pm we support |
This feature would allow selected columns in some tables to be masked so that end users cannot see sensitive data that the column contains. This feature would help to bring presto in line with enterprise security requirements.
The text was updated successfully, but these errors were encountered: