Getting Data In

Crowd sourcing sensitive data masking rules (PII, Passwords, keys, etc.) for various sourcetypes

dstaulcu
Builder

My team has a number of index-time sedcmd-based password masking rules for words in known positions of passwords. This strategy has worked well for us for a while. We are currently wrestling with a case where users accidentally include their passwords along with their upn (user@domain) in the userid field of a windows logon. Does anyone have a good way to handle this condition?

Similarly, does anyone know of any projects to curate lists of trusted splunk transforms for sensitive data masking?

Tags (2)
0 Karma

ddrillic
Ultra Champion

From the documentation side I see the following Anonymize data

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's no accounting for stupidity.

Perhaps, however, if the domain portion of the upn is well-known, you can mask everything that follows it.

---
If this reply helps you, Karma would be appreciated.
0 Karma

dstaulcu
Builder

That was might thought as well... some sort of negative look-behind. I thought I was good at regex until I tried to mask passwords with low fp rate.

0 Karma
Get Updates on the Splunk Community!

New in Observability - Improvements to Custom Metrics SLOs, Log Observer Connect & ...

The latest enhancements to the Splunk observability portfolio deliver improved SLO management accuracy, better ...

Improve Data Pipelines Using Splunk Data Management

  Register Now   This Tech Talk will explore the pipeline management offerings Edge Processor and Ingest ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

Register Join this Tech Talk to learn how unique features like Service Centric Views, Tag Spotlight, and ...