Data Privacy Module

The Data Privacy Module is based on the Four Eyes Principle which follows the idea that at least two people must approve any decision or operation. The principle is a mechanism to ensure transparency and delegate authority effectively.

Data Privacy Module
circle-info

For more information on how the Four Eyes Principle is implemented in LogPoint, refer to the Data Privacy Module in LogPoint.

Working of the Data Privacy Module

When the Data Privacy Module is enabled on a Fabric-enabled LogPoint, the selected fields from the normalized key-value pair of the Fabric-enabled LogPoint are encrypted in the Dashboard, Search, Report, and Incidents.

You can use the Data Privacy Module section in LPSM to generate a Data Privacy access request for encrypted fields that appear on the Search page. The request is created on behalf of the corresponding Fabric-enabled LogPoint’s admin user. Once the Fabric-enabled LogPoint’s user with the Can Grant Access privilege grants the request, the encrypted fields are decrypted.

The Data Privacy Module section also allows you to configure the template for the email that is sent to the LPSM user after the Data Privacy request is granted.

circle-info

For more information on how fields are encrypted and on the users with the Can Request Access and Can Grant Access privileges in a Fabric-enabled LogPoint, refer to the Configuring Data Privacy Module section.

There are two sections in the Data Privacy Module: Request and Email Template.

Request

The Request section lists all the Data Privacy requests generated for Report, Alert, and Search. It also enables you to generate a Data Privacy request for Search.

For details on generating a Data Privacy request for a scheduled Report, refer to the Scheduling section. For details on generating a Data Privacy request for Alert, refer to the Creating an Alert Rule section.

Email Template

The Email Template section allows you to configure the template for the email that is sent to the LPSM user after the Data Privacy Request has been granted. You can configure the email template for Report, Alert, and Search from this section.

Data Privacy Module Behaviors

Behavior in Dashboard

The normalized fields encrypted under the Data Privacy Module appear in the encrypted form while raw logs are hidden from the dashboard.

Behavior in Dashboard

The Search operation from LPSM to a Fabric-enabled LogPoint returns encrypted values for the fields which are encrypted under the Data Privacy Module. The raw logs are hidden from the Search page.

Behavior in Search

You can directly create a Data Privacy Access request by clicking on the drop-down arrow beside the encrypted field and selecting Request for user.

Data Privacy Request from Search

The Data Privacy Access Request Form adds the field and its corresponding value in the request field table.

Data Privacy Request

Behavior in Report

LPSM can only access the encrypted reports generated in the subscribed Fabric-enabled LogPoint. You can create a Data Privacy Access request for Report from the Scheduling section of Report Templates.

Behavior in Incidents

LPSM can fetch all the incidents generated in the subscribed Fabric-enabled LogPoints, but the Data Privacy fields remain encrypted. You can create a Data Privacy Access request for Alerts from the Creating an Alert Rule section of Alert Rules.

Last updated

Was this helpful?