Data security at IOMETE maintains access control using a user interface for consistent administration. Security admins set policies for databases, tables, and columns, managing permissions for groups or users.
Resource-based policies in IOMETE offers a powerful mechanism for enforcing security controls based on the resources being accessed. These policies cover three key areas:
An access policy comprises rules and permissions that specify who can access specific resources and the actions they can take after gaining access.
Data masking is a method to hide sensitive information by changing it into fake data while keeping its appearance intact. It safeguards private details during testing or sharing.
|Row-level filtering limits who can see certain rows in a database.
Tag-based policies in IOMETE allow administrators to manage access controls to resources based on assigned tags. Instead of defining policies for individual resources, administrators group resources with similar characteristics under a common tag and apply access controls to the entire tag. This simplifies policy management and allows users or groups to access all resources sharing the same tag with consistent access permissions.
|Tag-based Access Policy
Manage access controls to resources based on assigned tags. Resources with similar characteristics share common tags, and access controls are applied to the entire tag.
|Tag-based Masking Policy
Control data masking within resources based on their assigned tags. Sensitive data is categorized with tags to indicate sensitivity levels.