ABSTRACT

Once the enterprise is aware of what data needs to be considered sensitive, where this data resides (which applications and data stores handle sensitive data), who handles sensitive data and have the governance model as well as processes and guidelines to handle sensitive data as well as handle incidents of sensitive data leakage, it can be considered to be ready with the pre-requisites required for implementing data anonymization across the enterprise. At this stage, apart from the right data anonymization tool, the enterprise would be keen to understand the effort involved in anonymizing the sensitive applications across the enterprise. This effort would be the sum of the effort for anonymizing each sensitive application.