SAS® Fraud Management database tips


This SAS KB article explores some known behaviors and tuning recommendations for the SAS Fraud Management MEH, SOR, and TDR databases, along with some database vendor-specific notes. This article is generalized to help SAS Fraud Management and database experts discuss performance points, deferring to their expertise and to official SAS Fraud Management Guides. Note that it might also be helpful to review this article with SAS® Professional Services during project engagements.

SAS Fraud Management can use Oracle, DB2, or PostgreSQL for database management. However, SAS is not a database vendor, so SAS defers to and relies on customer expert DBAs, their database vendor, and consulting resources for ultimate database support.

Note: See the Appendix – Glossary of Terms regarding mnemonic abbreviations.

General Recommendations for the SAS Fraud Management Databases

All three SAS Fraud Management Databases (MEH, SOR, and TDR) benefit from using common best practices for IT and databases.

Many SAS Fraud Management customers are large banks and financial institutions. So, performance is paramount to meet the need to successfully process real-time fraud scoring and ARD decisions for hundreds to thousands of transactions per second 24x7x365.

Note that the information below is general. This section addresses common issues and challenges. Optimal settings might vary across the MEH, SOR, and TDR databases. Subsequent sections of this article detail best practices that are applicable to each of the MEH, SOR, and TDR databases.

Recommendations

Best Practices

Special Considerations

About the MEH Database

The MEH database is a relatively denormalized OLTP type of database that serves SAS Fraud Management ODEs. It contains evolving model entity behavior for SAS and customer model signatures in Z## tables and user variable supplements in V## tables. The MEH database is essential to the successful, timely operation of SAS Fraud Management ODE engines, which are in the critical path of users’ host or orchestration ARD authorization decisions.

Recommendations

Special Considerations

About the SOR Database

The SOR database is a more normalized operational type of database that supports all of the SAS Fraud Management Web/Applications: Manager’s Workbench; SAS® Rules Studio; and Analyst Workbench.

Recommendations

Special Considerations

About the TDR Database

The TDR database is a partially denormalized DW-hybrid type of database that contains the supporting tables for transactional history and fraud tagging. It is hybrid in that it provides historical operational data to the Analyst Workstation and IVR SOAP and REST automation.

Recommendations

CREATE INDEX IF NOT EXISTS <schema>cqf_m_csbf
    ON <schema>.fcm_csbf USING btree  (cqf_entity_value_m ASC NULLS LAST, smh_multi_org_id ASC NULLS LAST, smh_acct_type ASC NULLS LAST, smh_activity_type  ASC NULLS LAST, rqo_proc_utc_datetime ASC NULLS LAST) TABLESPACE <index tablespace name>;

Special Considerations

DBA Expectations

DBA experts might feel constrained by SAS Fraud Management’s OOTB architecture, so this section clarifies some general expectations to reinforce how critical DBA experts are to keep SAS Fraud Management optimally running and performant.

Deferring to your policies, procedures, preferences, and experts, here are some important points to consider.

SAS Fraud Management

General Recommendations

Best practices for DBAs include prioritizing security through access control, encryption, and regular audits; ensuring data integrity with backups, disaster recovery plans, and regular maintenance; and optimizing performance through monitoring, indexing, and performance tuning. Staying current with software updates and maintaining a standardized, dedicated environment are also crucial.

Performance

Data Integrity and Maintenance

Security

Environment and Planning

Appendix – Glossary of Terms