Home / Companies / New Relic / Blog / Post Details
Content Deep Dive

Sensitive Log Data Management: How to Protect Your Log Data from Security Breaches

Blog post from New Relic

Post Details
Company
Date Published
Author
Sadé C. Johnson, Developer Relations Engineer
Word Count
1,984
Language
English
Hacker News Points
-
Summary

In an age where personal identifiable information (PII) such as names, passwords, and social security numbers are increasingly vulnerable to exposure, proper data protection practices are crucial. The article highlights the role of developers in safeguarding data within applications, particularly through the use of log obfuscation techniques provided by platforms like New Relic. Developers can use New Relic’s log obfuscation feature to automatically or selectively mask and hash sensitive information to prevent unauthorized access, thereby enhancing data security. Masking involves replacing sensitive data with unsearchable "X" characters, while hashing converts data into cryptic values that can be retrieved later. The article guides users on implementing these techniques within New Relic, emphasizing the importance of properly securing PII to prevent potential crimes such as unauthorized financial activities. It also touches on the advanced features available to users with a Data Plus account, allowing for the creation of custom obfuscation rules to secure unique data patterns.