Skip to content
  • There are no suggestions because the search field is empty.

Internal: How to mask specific meta keys in RSA Security Analytics 10.4 and below

Issue

Administrators wish to allow their analysts to investigate incidents while not allowing them to view or export the actual meta values in a specific meta key (i.e. credit card numbers) within the RSA Security Analytics UI.

Tasks

To mask a specific meta key in Security Analytics, follow the steps below.
  1. Create an Application Rule on the Decoder or Log Decoder in question to truncate the session containing the meta, as explained here.
  2. After creating the rule, the meta key should no longer show any content in the sessions.
  3. Next, download the attached Tokenization LUA parser (tokenize.lua) and edit it where necessary to apply to the meta key being masked, which will cause the values to be hashed.  

Although performing this procedure will prevent the meta value content from being displayed in Security Analytics, you will still be able to see the count and source meta, as well as other meta related to the session.

Notes

RSA Security Analytics 10.5 provides new Data Privacy features that will more adequately perform this procedure.
This process should usually be performed by a Professional Services resource and this article exists only to document the procedure.

Product Details

RSA Product Set: Security Analytics
RSA Product/Service Type: Security Analytics UI, Decoder, Log Decoder
RSA Version/Condition: 10.3.x, 10.4.x
Platform: CentOS
O/S Version: EL5, EL6

Summary

How to mask confidential meta data (i.e.e credit card numbers) so that investigations can be performed but the actual values cannot be retained or viewed.


Approval Reviewer Queue

Technical approval queue