Skip to main content

Data Security

Data security at IOMETE maintains access control using a user interface for consistent administration. Security admins set policies for databases, tables, and columns, managing permissions for groups or users.


IOMETE has two types of policies:   resource-based and tag-based.

Resource-based policies

Resource-based policies in IOMETE offers a powerful mechanism for enforcing security controls based on the resources being accessed. These policies cover three key areas:

Policy TypeDescription
Access Policy

An access policy comprises rules and permissions that specify who can access specific resources and the actions they can take after gaining access.

Data Masking

Data masking is a method to hide sensitive information by changing it into fake data while keeping its appearance intact. It safeguards private details during testing or sharing.

Row-level FilterRow-level filtering limits who can see certain rows in a database.

Tag-based policies

Tag-based policies in IOMETE allow administrators to manage access controls to resources based on assigned tags. Instead of defining policies for individual resources, administrators group resources with similar characteristics under a common tag and apply access controls to the entire tag. This simplifies policy management and allows users or groups to access all resources sharing the same tag with consistent access permissions.

Policy TypeDescription
Tag-based Access Policy

Manage access controls to resources based on assigned tags. Resources with similar characteristics share common tags, and access controls are applied to the entire tag.

Tag-based Masking Policy

Control data masking within resources based on their assigned tags. Sensitive data is categorized with tags to indicate sensitivity levels.