Security and Compliance
Immuta offers several features to provide security for your users and to prove compliance and monitor for anomalies.
Security
Data processing and encryption
See the Data processing and the Encryption and masking practices guides for information about transmission of policy decision data, encryption of data in transit and at rest, and encryption key management.
Authentication
Registering the connection
The Teradata connection supports the following authentication methods to register a connection. The credentials provided must be for an account with the permissions listed in the Register a Teradata connection guide.
Username and password
LDAP
OAuth
Identity providers for user authentication
The built-in Immuta IAM can be used as a complete solution for authentication and user entitlement. However, you can connect your existing identity management provider to Immuta to use that system for authentication and user entitlement instead.
Each of the supported identity providers includes a specific set of configuration options that enable Immuta to communicate with the IAM system and map the users, permissions, groups, and attributes into Immuta.
See the Identity managers guide for a list of supported providers and details.
See the Teradata connection reference guide for details about user provisioning and mapping user accounts to Immuta.
Auditing and compliance
Immuta provides governance reports so that data owners and governors can monitor users' access to data and detect anomalies in behavior.
Immuta governance reports allow users with the GOVERNANCE Immuta permission to use a natural language builder to instantly create reports that delineate user activity across Immuta. These reports can be based on various entity types, including users, groups, projects, data sources, purposes, policy types, or connection types.
See the Governance report types page for a list of report types and guidance.
Last updated
Was this helpful?

