The query hit the database, but the data returned was not what the user expected. Sensitive fields were gone. In their place: masked values, enforced by policy the instant the request ran. This is Policy Enforcement Dynamic Data Masking working exactly as designed.
Dynamic Data Masking (DDM) hides sensitive information at query time without changing the underlying data. Policy Enforcement adds control rules on top, making masking automatic based on defined conditions. Combined, they ensure security that travels with the data itself. You don’t rely on developers remembering to hide values. You don’t trust that every API endpoint will sanitize output. The policies live in the system. They activate on access.
At its core, Policy Enforcement Dynamic Data Masking uses rules that check context before returning data. Conditions can reference roles, permissions, IP ranges, request origins, or even custom attributes. If the rule fires, masking patterns apply instantly, replacing original values with obfuscated forms. For example, a credit card number could be trimmed to its last four digits, or an email address masked after the ‘@’ symbol.
This approach offers precise control. You can define multiple masking policies for the same dataset, each triggered by different scenarios. Audit logs capture every masked access, letting teams analyze usage without exposing raw secrets. Because masking happens at runtime, it adapts to changes in roles and permissions immediately.