-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate with DLP #182
Comments
I looked through the POC. A few thoughts:
|
Are we sure this is the right architecture?Nope. That was a POC, not intended to be a a final solution. I wanted to see Solutions we've discussed up to this point have generally done in real-time. It is cheaper to do an asynchronous and non real time solution, however we thought the additional complexity unnecessary given our low TPS How much of this will be user-configurable?Undecided. Part of this would likely be to create a design, and whether we want to have a standard configuration for redaction, or allow users to create their own redaction configs. Other solutions in the area (Dryad) use a standard configuration for all. I'm curious about the decision to scrub instead of rejectIt only scrubs the request and response values, NOT the principal or other fields in the audit log. So your email would still be associated with whatever data you access, its just the accessed data that would be redacted. You can see this is the example provided in the POC:
Originally:
|
Thanks for the reply. That all makes sense. I think the "DLP in the path of the request" is still a concern we should discuss more. It impacts our maximum availability and we'd need to look into quota and QPS bits. |
The meta point: I meant DLP integration to be a "quick" feature that adds potential value to lumberjack. There isn't any clear requirement for it. So if it's going to complicate the lumberjack architecture by a lot (which is likely the case with async DLP processing), we should table the idea.
Considering the amount of audit logs won't be on the same scale as debug logs, I think the higher cost should be acceptable. Plus, this is meant to be an optional feature. E.g. an org could require product teams to not log req/resp (we have knob for that) if sensitive data is expected there.
We will minimally have:
scrub vs. reject - could be a global config (in addition to the ones above) |
Add integration with Cloud Data-Loss Prevention (DLP). This will allow us to redact sensitive information from requests & responses in our audit logs. POC here: #176
The text was updated successfully, but these errors were encountered: