Tags in Immuta
Audience: Data Owners, Data Users, and Data Governors
Content Summary: This page defines the uses of tags available in Immuta. All tags are created and managed by Data Governors. After they are created, they are added to data sources and projects by Data Owners, Project Owners, and Data Governors.
Tags have several uses; they can be used to drive policies. Data Owners can use tags on the local level for subscription or data policies directly in a data source. But Immuta recommends tags to be utilized on the Global level with Subscription and Data Policies. In doing this company wide data security restrictions can be controlled by the administrators and governors, while the users and data owners need only to worry about tagging the data correctly.
Tags can also be used to generate Immuta Reports for anything from insider threat surveillance and data access monitoring. Lastly, tags can be used to drive search results in the Immuta UI.
Governors can create tags or import tags from external catalogs in the Governance UI. Data Owners and Governors can then apply these tags to or remove them from projects, data sources, and/or specific columns within the data sources.
Best Practice: Managing Tags
Use the minimum number of tags possible to achieve the data privacy needed.
Sensitive Data Discovery
Best Practice: Use Sensitive Data Discovery
Sensitive Data Discovery can improve your ability to secure your data by automatically tagging sensitive entities, enabling the scalable implementation of Global Policies. Immuta highly recommends the use of this feature in tandem with verification of tags on all data sources.
Sensitive Data Discovery (SDD) helps to ensure sensitive data is properly managed and governed, providing fast identification for entities in columns such as credit card numbers, names, locations, social security numbers, bitcoin wallets, US phone numbers, financial data, and more.