Data Privacy Module

The Data Privacy Module is based on the Four Eyes Principle which follows the idea that at least two people must approve any decision or operation. The principle is a mechanism to ensure transparency and delegate authority effectively.

../_images/LPSM_DataPrivacy.png

Data Privacy Module

Note

For more information on how the Four Eyes Principle is implemented in LogPoint, refer to the Data Privacy Module in LogPoint.

Working of the Data Privacy Module

When the Data Privacy Module is enabled on a Fabric-enabled LogPoint, the selected fields from the normalized key-value pair of the Fabric-enabled LogPoint are encrypted in the Dashboard, Search, Report, and Incidents.

You can use the Data Privacy Module section in LPSM to generate a Data Privacy access request for encrypted fields that appear on the Search page. The request is created on behalf of the corresponding Fabric-enabled LogPoint’s admin user. Once the Fabric-enabled LogPoint’s user with the Can Grant Access privilege grants the request, the encrypted fields are decrypted.

The Data Privacy Module section also allows you to configure the template for the email that is sent to the LPSM user after the Data Privacy request is granted.

Note

For more information on how fields are encrypted and on the users with the Can Request Access and Can Grant Access privileges in a Fabric-enabled LogPoint, refer to the Configuring Data Privacy Module section.

There are two sections in the Data Privacy Module: Request and Email Template.

Request

The Request section lists all the Data Privacy requests generated for Report, Alert, and Search. It also enables you to generate a Data Privacy request for Search.

For details on generating a Data Privacy request for a scheduled Report, refer to the Scheduling section. For details on generating a Data Privacy request for Alert, refer to the Creating an Alert Rule section.

Follow the steps mentioned below to generate a Data Privacy request for Search:

  1. Go to Settings >> Configuration >> Data Privacy Module >> Request.

  2. Click Add Request.

    ../_images/LPSM_DataPrivacy_Request.png

    Request

    The Data Privacy Access Request Form panel appears.

    ../_images/LPSM_DataPrivacy_Request_Add.png

    Data Privacy Access Request Form

  3. In the Remote LogPoint section, select the name of the required Pool, Machine, and User where the Data Privacy Request is to be generated.

  4. In the Request Fields section, select the Field Name that you want to decrypt. The Field Name populates on the basis of the fields that have been encrypted by the corresponding Fabric-enabled LogPoint. The Field Value has three available options:

    • The All option requests the decryption of all values of the given Field Name.

    • The Encrypted option requires you to enter the encrypted data of the corresponding Field Name that you want to decrypt. Doing so requests the decryption of the Field Name for all logs matching the encrypted data.

    • The Plain option requires you to enter the plain data for the corresponding Field Name that you want to decrypt. Doing so requests the decryption of the Field Name for all the logs matching the plain data.

    Click Add after selecting the Field Name and the Field Value that you want to decrypt. You can add more than one Field and Field Value.

    The selected field is populated in the table.

    ../_images/LPSM_DataPrivacy_Requested_Fields.png

    Request Fields

    Scroll down and select the Access Logs Timeframe under the Mode Mapping section. The option allows you to select the time frame for the logs you want to decrypt.

  5. Select the time required to access logs in the Grant Access for field. The default time for granting access is 60 minutes.

  6. Enter a description for the generated request in the Description field.

  7. Click Submit.

    Note

    • Configure SMTP to receive mail notifications for the Data Privacy Request. Refer to the SMTP section to configure SMTP on LogPoint.

    • If SMTP is not configured in a Fabric-enabled LogPoint, the following warning message appears:

      ../_images/LPSM_DataPrivacy_Requested_warning.png

      Warning

      However, the request is sent to the Fabric-enabled LogPoint.

The Search request is listed on the Data Privacy Module page along with the Data Privacy requests for Alert and Report- Scheduled.

../_images/LPSM_DataPrivacy_Requested_created.png

Data Privacy Request created

When the request is granted, the Status field in the list is updated to reflect the change.

../_images/LPSM_DataPrivacy_Requested_granted.png

Data Privacy Request granted

Click the Search (search) icon to search the decrypted logs for which the request is granted.

../_images/LPSM_DataPrivacy_Requested_Search.png

Data Privacy search

Email Template

The Email Template section allows you to configure the template for the email that is sent to the LPSM user after the Data Privacy Request has been granted. You can configure the email template for Report, Alert, and Search from this section.

  1. Go to Settings >> Configuration >> Data Privacy Module >> Email Template.

    ../_images/LPSM_DataPrivacy_emailtemplate.png

    Email Template

  2. Select Report, Alert, or Search to configure the email template for the corresponding entity.

  3. Choose Use default template to use the pre-set format of the email template.

    ../_images/LPSM_DataPrivacy_Settings_Default_Reports.png

    Use default template (Report)

    ../_images/LPSM_DataPrivacy_Settings_Default_Alert.png

    Use default template (Alert)

    ../_images/LPSM_DataPrivacy_Settings_Default_Search.png

    Use default template (Search)

  4. Configure fields such as Subject and Message to create a customized template. You can also include Report, Alert, and Search specific fields such as status, acknowledged_by, comment, and requesting_user in the message body of the template.

    ../_images/LPSM_DataPrivacy_Settings_Custom.png

    Use custom template

  5. Click Save Template once the template is finalized.

    ../_images/LPSM_DataPrivacy_Settings_Save.png

    Save Template

Behavior in Dashboard

The normalized fields encrypted under the Data Privacy Module appear in the encrypted form while raw logs are hidden from the dashboard.

../_images/LPSM_DataPrivacy_Dashboard.png

Behavior in Dashboard

Behavior in Report

LPSM can only access the encrypted reports generated in the subscribed Fabric-enabled LogPoint. You can create a Data Privacy Access request for Report from the Scheduling section of Report Templates.

Behavior in Incidents

LPSM can fetch all the incidents generated in the subscribed Fabric-enabled LogPoints, but the Data Privacy fields remain encrypted. You can create a Data Privacy Access request for Alerts from the Creating an Alert Rule section of Alert Rules.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support