Table of Contents Table of Contents Title and Copyright Information 1 About Data Security Management Guide Target Audience Security Enhancment Features 2 Creating Your Own Vaults and Keys (Bring Your Own Key) Prerequisites for Generating your own Vault and Key Create and Activate your Cloud Account Add to Existing Cloud Account Access the Cloud Account Access the Oracle Identity Cloud Service Console Creating an Environment Creating New Vaults Creating New Keys 3 Managing Access Requests (Break Glass) Approving/Rejecting Access Requests 4 Introduction to Data Masking Enabling Data Masking