Policy Management

A general overview of the policy management functionality provided by Protegrity Data Security Platform.

The value of any company or its business is in its data. The company or business suffers serious issues if an unauthorized user gets access to the data. Therefore, it becomes necessary for any company or business to protect its data.

The data may contain sensitive information like personally identifiable information, company secrets such as pricing information or intellectual property etc. The process of protecting sensitive data to protect the privacy and personal identity of individuals is called De-Identification.

When de-identifying data, the analysis consists of:

  • Anonymization – In anonymization, the intent is to protect privacy by sanitizing any information that could lead to the individual being identified. The de-identified data cannot be re-identified. It includes methods like encryption, masking etc.
  • Pseudonymization – In pseudonymization, artificial identifiers or pseudonyms replace the identifying data within a data record. The de-identified data can be re-identified only to authorized users. It includes methods like vaultless tokenization.

The Protegrity methodology together with policy management provides a framework for designing and delivering enterprise data security solutions. Data security solutions, when adopted within an organization, ensures the security of information assets. One of the key components of data security is a policy.

Policy is a set of rules that defines how sensitive data needs to be protected. These policies are designed or created and then distributed to locations in the enterprise, where data needs to be protected.

Policy management is a set of capabilities for creating, maintaining, and distributing the policies.


Protegrity Data Security Methodology

A general overview of the methodology used in the Protegrity Data Security Management.

Package Deployment in Protectors

A general overview of how packages are deployed to Protectors.

Initializing the Policy Management

Instruction on how to initialize the Policy Management.

Components of a Policy

An overview of the components of a policy.

Creating and Deploying Policies

Policies contain detailed and comprehensive security definitions. Policies are distributed to the locations in your enterprise set up for policy enforcement.

Deploying Data Stores to Protectors

In deployment, the data stores containing the policies and trusted applications are prepared to be distributed to the protection points. The protector nodes pull this policy information in the data stores from the ESA to their respective policy enforcement points. Only the policies that are deployed are distributed across the protectors. Deploying a data store also deploys the trusted applications added to that data store.

Managing Policy Components

This section provides information about how to manage policy components.

Policy Management Dashboard

The Policy Management Dashboard displays an overview of the policy components and keys.

Exporting Package for Resilient Protectors

The export package process includes an API for exporting the package from the ESA. The exported package is used by the resilient protectors.

Appendix - Legacy Features

Legacy Policy Management features no longer applicable for 10.0.x protectors.

Last modified January 21, 2025