Skip to content

Martini Services Tracker Logging Data

Security and Privacy Concerns in Tracker

When implementing and utilizing the Tracker feature within Martini, it's crucial to recognize the balance between the invaluable insights gained from logging service invocations and the inherent security and privacy risks associated with storing potentially sensitive data. The data logged can be essential for data mining, troubleshooting, and generating reports, but it may also include sensitive information such as credit card numbers, social security numbers, or personal identifiers.

To mitigate these concerns and ensure data protection, access control measures have been put in place. Specifically, only Marketplace users and Martini users who are part of the ESBAPIAdminGroup have the authorization to access the logged data. This ensures that sensitive information is only accessible to a limited and authorized group of users, thereby reducing the risk of unauthorized data exposure.

For users authorized to access Tracker data, the following methods are available: - REST API Access: Both Marketplace users and Martini users under the ESBAPIAdminGroup can fetch Tracker documents using the REST API, providing a programmatic way to access logged data securely. - Tracker UI: Marketplace users have the exclusive ability to view Tracker documents directly via the Tracker UI. This provides a user-friendly interface for monitoring and reviewing logged data, with the added convenience of direct access through the Martini Marketplace.

To further safeguard privacy and ensure compliance with data protection regulations, consider implementing the following best practices: - Disable Tracker Logging: If the risk of logging sensitive data outweighs the benefits, you have the option to completely turn off the Tracker logging feature. This prevents any data from being persisted in the database, eliminating the risk of sensitive data exposure. - Data Masking: Before any data is logged in the Tracker database, ensure that all sensitive information is masked. This practice helps in protecting personal information, making sure that even if data is accessed, the sensitive parts are not readable or identifiable. - Selective Logging: Carefully select what data to persist in the Tracker database. You have the option to choose whether to log inbound data, outbound data, or both. This selective approach allows you to minimize the amount of sensitive data logged while still capturing the necessary information for your monitoring and troubleshooting needs.