<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to (easily) deny access for bucket containing secure data ? in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/268130#M35459</link>
    <description>&lt;P&gt;Hi Antonio,&lt;BR /&gt;how you are defining access to PARTICULAR standard entities and metrics - hosts, processes, services, requests, traces, apps, user actions ? Via policy boundaries ?&lt;BR /&gt;Are you still using management zones ?&lt;BR /&gt;BR, Josef&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jan 2025 14:15:20 GMT</pubDate>
    <dc:creator>josef_solnicky</dc:creator>
    <dc:date>2025-01-22T14:15:20Z</dc:date>
    <item>
      <title>How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264485#M34922</link>
      <description>&lt;P&gt;We created log bucket for secure data + Allow policy for special group - but probably because of default policy "Storage Logs Read" - anyboddy still can access those logs.&lt;BR /&gt;Cannot find any example in Docs.&lt;/P&gt;&lt;P&gt;Is there any easy solution ? Or do we need to DENY access from other groups ??&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR, Josef&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 14:58:43 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264485#M34922</guid>
      <dc:creator>josef_solnicky</dc:creator>
      <dc:date>2024-12-05T14:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264500#M34928</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/9567"&gt;@josef_solnicky&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PFA Dynatrace Resource that contains answer to the related storage policy:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies/advanced/iam-policystatements#storage" target="_blank"&gt;https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies/advanced/iam-policystatements#storage&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 18:06:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264500#M34928</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2024-12-05T18:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264515#M34931</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/9567"&gt;@josef_solnicky&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is my usual strategy among my clients, but I'm also open to new ideas:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Logs for each group/application goes into certain buckets.&lt;/LI&gt;&lt;LI&gt;No one has access to global logs (yeah, except adminns)&lt;/LI&gt;&lt;LI&gt;I give the following minimal policies to each group. Of course, you can add other functionalities, but this is the bare minimum I've got working. I still have to work on hardening the last two lines. Please notice you have to define the condition for storage:logs:read&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW app-engine:apps:run WHERE shared:app-id = "dynatrace.classic.logs.events";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW app-engine:apps:run WHERE shared:app-id = "dynatrace.notebooks";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW app-engine:apps:run WHERE shared:app-id = "dynatrace.logs";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW storage:buckets:read WHERE storage:bucket-name = "special_bucket";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW storage:logs:read WHERE storage:k8s.cluster.name = "special_k8s";&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW document:environment-shares:read;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW state:app-states:read, state:app-states:write, state:app-states:delete, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all, app-settings:objects:read, app-settings:objects:write;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;ALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 05 Dec 2024 20:49:19 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264515#M34931</guid>
      <dc:creator>AntonioSousa</dc:creator>
      <dc:date>2024-12-05T20:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264602#M34942</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/17213"&gt;@AntonioSousa&lt;/a&gt;&amp;nbsp;for detailed description.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 14:05:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264602#M34942</guid>
      <dc:creator>Peter_Youssef</dc:creator>
      <dc:date>2024-12-06T14:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264842#M34982</link>
      <description>&lt;P&gt;Thank you Antonio !&lt;BR /&gt;&lt;BR /&gt;Trying to implement it in first case - in fact just the log part now&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; ALLOW storage:buckets:read WHERE storage:bucket-name = "special_bucket";&lt;BR /&gt;&lt;/SPAN&gt;Plus removing the "Read Logs" and "&lt;SPAN&gt;Environment role - View logs&lt;/SPAN&gt;" policies.&lt;BR /&gt;&lt;BR /&gt;BR, Josef&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 07:44:02 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/264842#M34982</guid>
      <dc:creator>josef_solnicky</dc:creator>
      <dc:date>2024-12-10T07:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/268130#M35459</link>
      <description>&lt;P&gt;Hi Antonio,&lt;BR /&gt;how you are defining access to PARTICULAR standard entities and metrics - hosts, processes, services, requests, traces, apps, user actions ? Via policy boundaries ?&lt;BR /&gt;Are you still using management zones ?&lt;BR /&gt;BR, Josef&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 14:15:20 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/268130#M35459</guid>
      <dc:creator>josef_solnicky</dc:creator>
      <dc:date>2025-01-22T14:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to (easily) deny access for bucket containing secure data ?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/272725#M36002</link>
      <description>&lt;P&gt;Josef, did you find solution for that? I am currently trying to figure out what is the best way to control access to entities and data in Kubernetes, Problems and Logs application.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I believe this is a very common use case, yet I haven't been able to find any good examples!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 14:40:49 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-easily-deny-access-for-bucket-containing-secure-data/m-p/272725#M36002</guid>
      <dc:creator>panumjp</dc:creator>
      <dc:date>2025-03-17T14:40:49Z</dc:date>
    </item>
  </channel>
</rss>

