Discovery overview

Sensitive data discovery identifies sensitive data and proposes masking rules to protect it, ensuring privacy and compliance with data protection regulations.  

The overall process flow diagram is shown below that consists of the following steps:

  1. ADF reads metadata and sample data from the source connector.

  2. One of the steps in the ADF pipeline transmits the data to the Delphix Compliance Services:

    1. The data transmission can happen over a private link

    2. Or via the publicly available external gateway

  3. Delphix Compliance Services receives the data.

  4. The metadata and the sample dataset are scanned by the discovery service to identify sensitive fields, suggesting any masking rules for the identified fields. 

  5. ADF reads the results of the discovery from DCS over the private link.

  6. Finally, the scanned results are written to the metadata repository in an Azure SQL DB.