The DMS methodology diagram explains the 4–step methodology that Oracle Data Masking and Subsetting uses to secure non-production database and replace sensitive data with fictitious, yet relevant data. In the first step, an ADM is created to discover sensitive data and data relationships. The next step is to select masking formats and templates, and create goals and conditions for subsetting the data. In the next step, the masking and subsetting reduction results are previewed and validated. Finally, in-database or in-export masking and subsetting are executed, and the data that is masked or subsetted is validated.