This guide is intended for informational purposes only and does not constitute legal advice. While every effort has been made to ensure the accuracy of the information provided, it is recommended that you consult with a qualified legal professional to ensure compliance with all applicable laws and regulations.
This use case from the financial industry involves a company that processes payments on behalf of online merchants. The company’s payment gateway relies on log data for various purposes to provide services to its customers (online merchants), address and troubleshoot complaints from end-users (online merchants customers), and detect and prevent fraud. The user flow includes the following steps for the payment service use case:
Logging payment transactions is essential for SLA compliance, platform performance, and troubleshooting. Payment logs very likely also contain sensitive information like personal data and financial data that must be kept secure. In cases where logs are collected from different sources (such as various merchants in this use case), utilizing OpenPipeline helps to consolidate data and to address security, privacy and compliance requirements.
If your logs contain personal information or other sensitive data, you may be subject to privacy or security requirements. Dynatrace does not require regulated personal information or sensitive data to provide value (and, per our Subscription Agreement, customers should not provide such data into the platform).
Start with reviewing the data that your logs collect. In this online store use case, this could include information such as a user’s IP address, email address, or ID. While this information may be necessary for certain use cases, you should decide whether you actually need this information for your specific purpose. Check whether your organization has guidelines on protecting sensitive data that you can use.
Gain a deeper understanding of the different types of masking used in Log Management and Analytics compliance.
At-capture masking requires identifying and masking sensitive parts of your log records before data is transferred to Dynatrace. To achieve this, you can choose OneAgent to collect your logs. OneAgent has a built-in mechanism for sensitive data masking that can be granularly configured on the host, host group, or environment level.
For details, refer to Mask your logs at capture or Protect personal data by not capturing it (masking at capture).
When masking at storage is implemented, data is sent to the Dynatrace server for optimal analysis and is masked before it's stored.
For details, refer to Protect personal data by not storing it (masking at storage).
When data is masked at display, it's stored in its original form but is accessible only to the users of your choice.
For details, refer to Protect personal data by not displaying it (masking at display).
With this method, you can mask the data once it reaches Dynatrace, by setting log processing rules. After data is processed, it is sent to storage and is available for further analysis. The key advantage of this method is the fact that it allows data flow from all log ingest channels.
For details, refer to Mask your logs at ingest.
As a customer support representative, you need to assist customers’ payment-related inquiries.
When a merchant’s customer encounters payment issues and seeks support, the customer support representative investigates the situation by reviewing logs to determine what occurred. In this scenario, we exclude the payment processing logs and assume that the customer support representative already has information regarding the status of the payment request received from the merchant.
As a security administrator, you want to identify and prevent potential financial fraud through our system.
Security administrators use detailed log records in Dynatrace to identify unusual patterns or anomalies that may indicate fraudulent activity. This proactive approach allows for quick intervention, protecting both the service and its users from potential losses. Additionally, comprehensive logs provide evidence for potential investigations and legal actions against fraudsters.
The table below lists some of the personal information that a log line might include and provides a link to the documentation that describes how to either mask the data, control access to this data, or help meet your compliance requirements in another way.
The screenshot below shows how the ingested logs can look after some of the actions described in the table above are applied.