Sensitive Data Center

  • Latest Dynatrace
  • App
  • 9-min read
Prerequisites

Permissions

The following table describes the required permissions.

Permission
Description
storage:logs:read
Enables the app to query logs
storage:logs:write
Enables the app to write privacy audit logs
storage:buckets:read
Enables the app to list Grail buckets
state:app-states:read
Enables the app to read request data
state:app-states:write
Enables the app to store request data
state:app-states:delete
Enables the app to delete request policies
state:user-app-states:read
Enables the app to read user configuration
state:user-app-states:write
Enables the app to store user configuration
iam:service-users:use
Enables the app to process requests using a service user
email:emails:send
Enables the app to send status updates for requests

Installation

Make sure the app is installed in your environment.

Before you begin

Some one-time setup is necessary before using Sensitive Data Center Sensitive Data Center.

Create service user

Sensitive Data Center Sensitive Data Center uses a service user to continue processing scans and requests while you aren't using the app. See Create service users and Create policies based on a service user, to learn how to create the service user and assign a policy to it. Assign a policy with the following permissions and make sure to name the service user sensitive-data-center. The name must match exactly. This user must also be assigned to the sensitive-data-center-users group defined in the next section.

ALLOW app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW iam:users:read, iam:groups:read;
ALLOW storage:records:delete, storage:logs:write, storage:events:write;
ALLOW storage:fieldsets:read, storage:system:read, storage:logs:read, storage:events:read, storage:bizevents:read, storage:metrics:read, storage:spans:read, storage:buckets:read;
ALLOW email:emails:send;
ALLOW document:documents:read, document:documents:write, document:direct-shares:write, document:documents:delete, document:trash.documents:delete;
ALLOW automation:workflows:read, automation:workflows:write;

If you previously used Privacy Rights, rename your privacy-rights service user to sensitive-data-center rather than creating a new service user. Note that the required permissions have changed and you must also update them. Renaming your service user allows Sensitive Data Center Sensitive Data Center to automatically clean up the workflow used by Privacy Rights. Alternatively, a Workflows administrator can delete it manually.

sensitive-data-center-users

Assign users to this group who should be able to create requests and scans. To ensure that they see all matching data for requests and scans, these users need unrestricted access to data in Grail. For Sensitive Data Center Sensitive Data Center to function correctly, the group name must match exactly and the group must be assigned a policy with the following permissions:

ALLOW app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW app-engine:functions:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';
ALLOW iam:service-users:use WHERE iam:service-user-email = "YOUR-SERVICE-USER-EMAIL-HERE";
ALLOW iam:users:read, iam:groups:read;
ALLOW storage:logs:write, storage:events:write;
ALLOW storage:fieldsets:read, storage:logs:read, storage:bizevents:read, storage:buckets:read;
ALLOW email:emails:send;
ALLOW document:documents:read;
ALLOW automation:workflows:read, automation:workflows:write;

Replace the placeholder value for iam:service-user-email with the email of your sensitive-data-center service user. To find the email of your service user:

  1. In Dynatrace, go to Account Management.
  2. Select Identity & access management > Service users. You will see an overview table with all of your service users.
  3. In the Actions column, select > Edit.
  4. The service user's email is displayed at the top.

If you previously used Privacy Rights, this group is equivalent to the Privacy Rights request assignees group. You can edit the group name and reuse the same group, but note that the policy needs updating with additional permissions. These permissions support the Sensitive Data Scanner functionality coming soon in Sensitive Data Center Sensitive Data Center.

sensitive-data-center-admins

Assign users to this group who should be able to approve requests and delete data from Grail. All users assigned to this group must also be assigned to the sensitive-data-center-users group. For Sensitive Data Center Sensitive Data Center to function correctly, the group name must match exactly and the group must be assigned a policy with this permission:

ALLOW storage:records:delete;

If you previously used Privacy Rights, this group is equivalent to the Privacy Rights request reviewers group. You can edit the group name and reuse the same group, but note that the policy has changed.

Configure audit logging

By default, audit logs go to the default_logs bucket. To change this, you can create a privacy_audit bucket to assign audit logs to. The name must match exactly. You can customize the retention period to suit your needs and restrict access to the bucket using IAM policies. You also need to configure bucket assignment so that logs matching log.source == "Sensitive Data Center" are assigned to the privacy_audit bucket.

Restrict access

As sensitive data is visible in Sensitive Data Center Sensitive Data Center, we recommend you restrict access for users who don't need to create or review requests and scans. To prevent users from accessing Sensitive Data Center Sensitive Data Center, you can assign them to a group with the following policy:

DENY app-engine:apps:run WHERE shared:app-id = 'dynatrace.sensitive.data.center';
DENY state:app-states:read, state:app-states:write, state:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';
DENY state-management:app-states:delete WHERE shared:app-id = 'dynatrace.sensitive.data.center';
DENY iam:service-users:use WHERE iam:service-user-email = "YOUR-SERVICE-USER-EMAIL-HERE";

They should also be denied read access to audit logs in the default_logs or privacy_audit buckets (depending on your chosen audit logging configuration).

Sensitive Data Center Sensitive Data Center empowers you to address and manage customer requests related to data subject rights under applicable data protection laws (for example, GDPR and CCPA/CPRA).

Sensitive Data Center Sensitive Data Center helps you to:

  • Export personal data: review and export personal data about a specific end-user.
  • Delete personal data: review and delete personal data about a specific end-user.
  • Cleanup data: delete mistakenly ingested data for a specific timeframe.
  • Scan for mistakenly ingested sensitive data, such as credit card numbers and IBANs. This functionality will soon be available in preview.

Sensitive Data Center Sensitive Data Center currently supports export, deletion, and cleanup of Grail logs. Other data types are not supported.

Sensitive Data Center Sensitive Data Center uses a multi-party access control model to protect your data. This requires setup of policies, groups, and a service user before first use of the app. See Prerequisites to learn more. We recommend that you restrict access to the app, app state, service user, and audit logs to a small group of trusted users. The service user has extensive permissions and could be mistakenly or deliberately abused, for example, to delete a large volume of data. Users with access to the app state may be able to modify requests even if they don't have access to the app UI. To learn how to restrict access, see Prerequisites.

Create a request to review and export personal data about a specific end-user. The overview includes details of all requests, including the relevant user identifier, assignees and reviewers, the current status of each request, as well as the defined due date. Audit logs and request policies can be accessed and managed from this page.In the export request form, you specify the user details such as user type, a user identifier to search for matching data in Grail, and the scope of the search in Grail (the timeframe and log buckets).For each created request, the data matching the executed query are returned and can be viewed by number of log records, volume, data residency, as well as number of systems. The reviewer can then approve or reject export of this data.
1 of 3Create a request to review and export personal data about a specific end-user. The overview includes details of all requests, including the relevant user identifier, assignees and reviewers, the current status of each request, as well as the defined due date. Audit logs and request policies can be accessed and managed from this page.

Learning modules

Related tags
Dynatrace PlatformSensitive Data CenterSensitive Data Center