Masking sensitive data in logs with CloudWatch Data Protection
HTML-код
- Опубликовано: 2 дек 2023
- Whenever you handle sensitive information like addresses, names, emails. social security numbers or even AWS secret keys in your code this has the potential to make this information available in the logs. That is usually not a good thing so you might want to mask this information in the logs.
CloudWatch Data protection allows you to do that. In this video I will show you how to use this feature to mask sensitive information in the logs.
If you liked this video please click on the like button! There's a new video on Majestic.cloud once a week so if you want to stay updated and don't want to miss any new videos then please subscribe to the channel!
Visit the site: majestic.cloud
Follow me on Twitter:
/ lacisoft (László)
/ cloud_majestic (Majestic.cloud)
Follow on Facebook: / majesticcloudcomputing Наука
Thanks for great explanation!!!
Thank you so much for the video. It was very helpful. I have a question. I want to get notified via email when ever any PII data detected in logstream. Could you please guide on that too?
Hi, great explanation, thanks! I have a query regarding managing millions of logs. Suppose the data protection log identifies a few occurrences in the log group "piidetected". How can I efficiently search for the specific log stream and log line in the log group where the PII is reported?