Loading EN-304-622.md +18 −21 Original line number Diff line number Diff line Loading @@ -554,29 +554,26 @@ https://www.skyflow.com/post/how-to-keep-sensitive-data-out-of-your-logs-nine-be ### C.1.1 Data - Credentials - Logs - Configuration - Product of analysis * List of scrape clients * Device inventory * Contact information SIEM process management * Raports of all sorts * Alerting configuratoin * Report generation configuration * Integration configuration * Log data * ETL worklflow configuration * Trained models * Data composition table <mark>fixme</mark> * PII data in logs or ingested sources * Confindential busines information in the sources * Cryptographic keys * Authentication related secrets (tokens, keys) * Raports of all sorts * Concept of administrator * RBAC - List of scrape clients - Device inventory - Contact information SIEM process management - Raports of all sorts - Alerting configuratoin - Report generation configuration - Integration configuration - Log data - ETL worklflow configuration - Trained models - Data composition table <mark>fixme</mark> - PII data in logs or ingested sources - Confindential busines information in the sources - Cryptographic keys - Authentication related secrets (tokens, keys) - Raports of all sorts - Concept of administrator - RBAC <mark>Where does CSXX, working function (val knows)</mark> Loading Loading
EN-304-622.md +18 −21 Original line number Diff line number Diff line Loading @@ -554,29 +554,26 @@ https://www.skyflow.com/post/how-to-keep-sensitive-data-out-of-your-logs-nine-be ### C.1.1 Data - Credentials - Logs - Configuration - Product of analysis * List of scrape clients * Device inventory * Contact information SIEM process management * Raports of all sorts * Alerting configuratoin * Report generation configuration * Integration configuration * Log data * ETL worklflow configuration * Trained models * Data composition table <mark>fixme</mark> * PII data in logs or ingested sources * Confindential busines information in the sources * Cryptographic keys * Authentication related secrets (tokens, keys) * Raports of all sorts * Concept of administrator * RBAC - List of scrape clients - Device inventory - Contact information SIEM process management - Raports of all sorts - Alerting configuratoin - Report generation configuration - Integration configuration - Log data - ETL worklflow configuration - Trained models - Data composition table <mark>fixme</mark> - PII data in logs or ingested sources - Confindential busines information in the sources - Cryptographic keys - Authentication related secrets (tokens, keys) - Raports of all sorts - Concept of administrator - RBAC <mark>Where does CSXX, working function (val knows)</mark> Loading