The following table describes the required permissions.
Make sure the app is installed in your environment.
Some one-time setup is necessary before using
Sensitive Data Center.
Sensitive Data Center uses a service user to continue processing scans and requests while you aren't using the app. See Create service users and Create policies based on a service user, to learn how to create the service user and assign a policy to it. Assign a policy with the following permissions and make sure to name the service user sensitive-data-center. The name must match exactly. This user must also be assigned to the sensitive-data-center-users group defined in the next section.
ALLOW app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW iam:users:read, iam:groups:read;ALLOW storage:records:delete, storage:logs:write, storage:events:write;ALLOW storage:fieldsets:read, storage:system:read, storage:logs:read, storage:events:read, storage:bizevents:read, storage:metrics:read, storage:spans:read, storage:buckets:read;ALLOW email:emails:send;ALLOW document:documents:read, document:documents:write, document:direct-shares:write, document:documents:delete, document:trash.documents:delete;ALLOW automation:workflows:read, automation:workflows:write;
If you previously used Privacy Rights, rename your privacy-rights service user to sensitive-data-center rather than creating a new service user. Note that the required permissions have changed and you must also update them. Renaming your service user allows
Sensitive Data Center to automatically clean up the workflow used by Privacy Rights. Alternatively, a Workflows administrator can delete it manually.
Assign users to this group who should be able to create requests and scans. To ensure that they see all matching data for requests and scans, these users need unrestricted access to data in Grail. For
Sensitive Data Center to function correctly, the group name must match exactly and the group must be assigned a policy with the following permissions:
ALLOW app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW app-engine:functions:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';ALLOW iam:service-users:use WHERE iam:service-user-email = "YOUR-SERVICE-USER-EMAIL-HERE";ALLOW iam:users:read, iam:groups:read;ALLOW storage:logs:write, storage:events:write;ALLOW storage:fieldsets:read, storage:logs:read, storage:bizevents:read, storage:buckets:read;ALLOW email:emails:send;ALLOW document:documents:read;ALLOW automation:workflows:read, automation:workflows:write;
Replace the placeholder value for iam:service-user-email with the email of your sensitive-data-center service user. To find the email of your service user:
If you previously used Privacy Rights, this group is equivalent to the Privacy Rights request assignees group. You can edit the group name and reuse the same group, but note that the policy needs updating with additional permissions. These permissions support the Sensitive Data Scanner functionality coming soon in
Sensitive Data Center.
Assign users to this group who should be able to approve requests and delete data from Grail. All users assigned to this group must also be assigned to the sensitive-data-center-users group. For
Sensitive Data Center to function correctly, the group name must match exactly and the group must be assigned a policy with this permission:
ALLOW storage:records:delete;
If you previously used Privacy Rights, this group is equivalent to the Privacy Rights request reviewers group. You can edit the group name and reuse the same group, but note that the policy has changed.
By default, audit logs go to the default_logs bucket. To change this, you can create a privacy_audit bucket to assign audit logs to. The name must match exactly. You can customize the retention period to suit your needs and restrict access to the bucket using IAM policies. You also need to configure bucket assignment so that logs matching log.source == "Sensitive Data Center" are assigned to the privacy_audit bucket.
As sensitive data is visible in
Sensitive Data Center, we recommend you restrict access for users who don't need to create or review requests and scans. To prevent users from accessing
Sensitive Data Center, you can assign them to a group with the following policy:
DENY app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';DENY state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';DENY state-management:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';DENY iam:service-users:use WHERE iam:service-user-email = "YOUR-SERVICE-USER-EMAIL-HERE";
They should also be denied read access to audit logs in the default_logs or privacy_audit buckets (depending on your chosen audit logging configuration).
Sensitive Data Center empowers you to address and manage customer requests related to data subject rights under applicable data protection laws (for example, GDPR and CCPA/CPRA).
Sensitive Data Center helps you to:
Sensitive Data Center currently supports export, deletion, and cleanup of Grail logs. Other data types are not supported.
Sensitive Data Center uses a multi-party access control model to protect your data. This requires setup of policies, groups, and a service user before first use of the app. See Prerequisites to learn more.
We recommend that you restrict access to the app, app state, service user, and audit logs to a small group of trusted users. The service user has extensive permissions and could be mistakenly or deliberately abused, for example, to delete a large volume of data. Users with access to the app state may be able to modify requests even if they don't have access to the app UI. To learn how to restrict access, see Prerequisites.



Sensitive Data Center