Logpoint’s Data Privacy Module functions under the Four Eyes Principle, also called the Two-Man Rule. This principle considers that the actions posing a material risk profile must be monitored and controlled by at least two authorized stakeholders. The Data Privacy Module alleviates the risks resulting due to the absence of adequate control by executing the Access Control approach. Simply put, Logpoint’s Data Privacy Module uses an authorized user to assure the access of sensitive information to limited users for a limited time.
Only the Logpoint Administrator users can enable or disable the Data Privacy Module in Logpoint and select the data fields to be encrypted. Once the Data Privacy Module is enabled, Logpoint encrypts the values of the selected data fields in the log results.
Note
All the raw logs are hidden when you enable the Data Privacy Module.
No user can access the decrypted values on their own. To get the decrypted values, you need to request permission from an authorized user. The authorized user can then accept or reject the request.
Note
Through the Data Privacy Module section in the Configuration page, the users with the Can Request Access privilege can request to access the data of the Data Privacy Module fields in the decrypted form and view the list of their requests till date. On the other hand, the users with the Can Grant Access privilege can view the pending requests, accept/deny requests and view the history of the past requests and their actions. In addition to that, they can also request to access the Data Privacy Module fields in the decrypted form (if the privilege is provided).
This guide provides the required steps and information to configure the Data Privacy Module in Logpoint. It helps you understand and perform the following tasks :
Configure the Data Privacy Module. Refer to Configuring Data Privacy Module.
Make request to retrieve the decrypted data of the Data Privacy Module fields. Refer to Requesting Access.
Accept/Deny any request to retrieve the decrypted data of the Data Privacy Module fields. Refer to Accessing/Denying Request.
View the decrypted data of the Data Privacy Module fields. Refer to Viewing the Decrypted Data.
Delete any request to retrieve the decrypted data of the Data Privacy Module fields. Refer to Deleting a Request.
View the list of requests made and actions perfomred. Refer to History.
We are glad this guide helped.
Please don't include any personal information in your comment
Contact Support