Masking sensitive data in logs with CloudWatch Data Protection

Поделиться
HTML-код
  • Опубликовано: 2 дек 2023
  • Whenever you handle sensitive information like addresses, names, emails. social security numbers or even AWS secret keys in your code this has the potential to make this information available in the logs. That is usually not a good thing so you might want to mask this information in the logs.
    CloudWatch Data protection allows you to do that. In this video I will show you how to use this feature to mask sensitive information in the logs.
    If you liked this video please click on the like button! There's a new video on Majestic.cloud once a week so if you want to stay updated and don't want to miss any new videos then please subscribe to the channel!
    Visit the site: majestic.cloud
    Follow me on Twitter:
    / lacisoft (László)
    / cloud_majestic (Majestic.cloud)
    Follow on Facebook: / majesticcloudcomputing
  • НаукаНаука

Комментарии • 3

  • @iaroslavdavydiak6439
    @iaroslavdavydiak6439 6 месяцев назад

    Thanks for great explanation!!!

  • @sanjitshaw2441
    @sanjitshaw2441 26 дней назад

    Thank you so much for the video. It was very helpful. I have a question. I want to get notified via email when ever any PII data detected in logstream. Could you please guide on that too?

  • @karmendra1984
    @karmendra1984 3 месяца назад

    Hi, great explanation, thanks! I have a query regarding managing millions of logs. Suppose the data protection log identifies a few occurrences in the log group "piidetected". How can I efficiently search for the specific log stream and log line in the log group where the PII is reported?