Data Privacy

Data Privacy ensures that only authorized users can access sensitive information. It encrypts specific values in log results so only users with the right permissions can access the actual data. For example, only users within a specific user group can see a username in the log, while members of another user group see the username encrypted.

An admin user:

  • Activates Data Privacy

  • Selects which fields to encrypt. An admin user can manually select the fields or upload a .csv file with the fields. Make sure the file is in .csv format.

  • Creates the User Groups, or which users can request access and which users can grant access.

Users to view encrypted data:

  • Are part of a Can Request Access user group.

  • Send a request.

  • Check if the request is approved and view the data.

Users who grant access:

  • Are part of a Can Grant Access user group.

  • Receive a request notification.

  • Approve or reject the request.

chevron-rightActivating Data Privacyhashtag

You must setup SMTP before activating data encryption or data privacy.

  1. In the navigation bar, go to Settings >> System Settings>> System Settings.

  2. Click Data Privacy Module.

  3. Select Enable Data Privacy Module.

  4. In Encryption Scheme, select:

    1. Simple for encoding less critical fields where speed and low processing overhead are essential. Enter an Encryption Key. After upgrading to Logpoint v7.8.0, users who were using the simple encryption scheme will have an automatically generated encryption key. You can update it from here.

      Do not use this if your goal is to encrypt the fields with industry standard encryption, as it only obfuscates the fields in the UI from low-privilege users.

    2. Complex to apply industry standard encryption to the fields. Use this for confidential data. It ensures a higher level of data privacy and requires additional computational power.

      1. Enter an Encryption Key to encrypt the field data.

  5. To encrypt fields,

    1. Enter the names of the fields Add.

    2. Upload a .csv file. The format of the file needs to include the column headers you see in the GUI.

  1. Click Save Changes.

chevron-rightRequesting Accesshashtag
  1. Go to Settings >> Configuration from the navigation bar and click Data Privacy Module.

  2. In My Request, click Add.

  3. Select the Field Name.

  4. In Value Type, select:

    1. All Value to decrypt the field for all logs (e.g., all source_address fields).

    2. Encrypted Value to decrypt a specific encrypted field value. Enter it in Value.

    3. Plain Value to decrypt the specific plain value of a selected field.

  5. Click Add. You can change your request later if needed.

  6. In ACCESS TIME INFORMATION:

    1. Select the start date and end date for extracting decrypted data

    2. In Grant Access For, select how long you want to view the decrypted data

  7. Add the Description to the requested field(s)

  8. Click Save. The request is sent and added to the My Request list.

chevron-rightViewing Decrypted Datahashtag

After your request is approved, you receive an email.

  1. In the navigation bar, go to Settings >> System Settings >> Data Privacy Module.

  2. Click My Request.

  3. In Status, look for Granted. The request could also be pending if an approver hasn't acted yet.

  4. Click the Search icon next to the request to view results.

chevron-rightReceiving a Data Decryption Requesthashtag

You will receive an email notification when there is a decryption request to review.

chevron-rightAccepting / Denying a Requesthashtag

All requests to retrieve Data Privacy decrypted fields are listed under Pending Request.

  1. Go to Settings >> Configuration from the navigation bar and click Data Privacy Module.

  2. Click Pending Request.

    1. Type: Reason for access (Report-Adhoc, Report-Scheduled, Search).

    2. Fields: Which fields were requested.

    3. Start Date: Timestamp of initial data decryption.

    4. Log Access Duration: Timeframe of access to decrypted logs.

    5. Status: Current request status.

    6. Requested By: Username of the requester.

  1. In Actions, click the Pending Request icon.

  2. Search Request lists all the details.

  3. Use Comments to add one. If you intend to deny the request, a comment is mandatory.

  4. Click Accept to approve the request or Deny to reject it.

chevron-rightDeleting a Requesthashtag
  1. Go to Settings >> Configuration from the navigation bar and click Data Privacy Module.

  2. To delete:

    1. a single request, select it in the list and in the Actions column click the Delete icon.

    2. multiple requests, select the ones to delete and click the MORE dropdown. Click Delete Selected.

    3. all the requests groups, click the MORE dropdown and click Delete All.

  1. Click Yes.

Export & Import Requests

You can export and import access requests between different Logpoint instances or servers for the Data Privacy module in .csv format.

chevron-rightExporting Requestshashtag
  1. Go to Settings >> Configuration from the navigation bar and click Data Privacy Module.

  2. Click the Export button.

  3. Choose the fields you want to include in the export.

  4. Click Export to save the request details in a CSV file.

chevron-rightImporting Requestshashtag
  1. Go to Settings >> Configuration from the navigation bar and click Data Privacy Module.

  2. Click the Import button.

  3. Select the CSV file containing the request details.

  4. Click Import to load the requests from the file.

Audit Logs for Data Privacy

All actions related to Data Privacy (requests, approvals, denials, deletions) are tracked and recorded in the system's audit logs, providing a complete history of activities for compliance review.

chevron-rightViewing Data Privacy Audit Logshashtag
  1. Go to Settings >> Logs from the navigation bar and click Audit Logs.

  2. Filter the logs to view actions related to Data Privacy.

  3. Review data encryption actions including user requests, approvals, and denials.

Last updated

Was this helpful?