Tags in Immuta
Audience: Data Owners, Data Users, and Data Governors
Content Summary: This page defines the uses of tags available in Immuta. All tags are created and managed by Data Governors. After they are created, they are added to data sources and projects by Data Owners, Project Owners, and Data Governors.
Tags have several uses; they can be used to drive policies. Data Owners can use tags on the local level for subscription or data policies directly in a data source. But Immuta recommends tags to be utilized on the Global level with Subscription and Data Policies. In doing this company wide data security restrictions can be controlled by the administrators and governors, while the users and data owners need only to worry about tagging the data correctly.
Tags can also be used to generate Immuta Reports for anything from insider threat surveillance and data access monitoring. Lastly, tags can be used to drive search results in the Immuta UI.
Governors can create tags or import tags from external catalogs in the Governance UI. Data Owners and Governors can then apply these tags to or remove them from projects, data sources, and/or specific columns within the data sources.
Best Practice: Managing Tags
Use the minimum number of tags possible to achieve the data privacy needed.
Sensitive Data Detection
Sensitive Data Detection is a feature that automatically tags columns with sensitive data during data source creation. It needs to be enabled by a systems admin, but once enabled it will work united with Data Owners, saving time and giving a shortcut to the data tagging that leads to safer data.
Best Practice: Use Sensitive Data Detection
Turning on Sensitive Data Detection can improve your data's securing with its automated tagging. Immuta highly recommends the use of this feature in tandem with vigilant verification of tags on all data sources.
Now that you understand tags, continue to one of these tutorials: