IBM Security Guardium Ideas Portal


This portal will be removed

In IBM’s effort to continue to streamline and simplify navigation for our customers, this Ideas portal will be shut down on February 28, 2023. We would ask that you use the main IBM Ideas portal at https://ideas.ibm.com/ or the IBM Security-specific portal at https://ibmsecurity.ideas.ibm.com/ to review, vote for existing ideas, or add new ideas.

Ability to log Access/Request if Extrusions / Results are being logged

Use case : today with extrusion rules or with new feature of sensitive object monitoring, there is a scenario when we log extrusion /results but we don't log actual request (for example in case of selective audit policy or skip logging on specific requests). When is happens we do log Full / Masked SQL as part of the extrusion (assuming action of extrusion rule is log full/masked details); however since actual request is not logged we don't have parsing artifacts of this SQL. So if anyone needs to create report , for example, of sensitive objects , those records will not make it to the report. Possible solution : evaluate the option to log & parse request 'after the fact', if extrusion rule or 'sensitive object' functionality fired.
  • Guest
  • Oct 2 2021
  • Future consideration
  • Admin
    RAJESH VENKATASUBBU commented
    4 Oct, 2021 03:45am

    Hello - thank you for your submission. We are looking into this request further, we will get back to you with our findings.


    Regards,

    Product Management Team

    IBM Data Security / Guardium

By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.