<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ‘View Logs’ role seems to be bypassing conditional access for Grail storage. Is this true? in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/View-Logs-role-seems-to-be-bypassing-conditional-access-for/m-p/268459#M35519</link>
    <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN class="TextRun SCXW153963261 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;“&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A class="Hyperlink SCXW153963261 BCX0" href="https://docs.dynatrace.com/docs/shortlink/role-based-permissions-for-environment-access#environment" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class="TextRun Underlined SCXW153963261 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0" data-ccp-charstyle="Hyperlink"&gt;View Logs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="TextRun SCXW153963261 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;” &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;is a permission of type ‘role&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;’&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; and as such&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; it does not adhere to &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;attribute-based conditions. Consider&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; for example&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; that one of your user groups has been assigned&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop SCXW153963261 BCX0"&gt;&lt;SPAN class="SCXW153963261 BCX0"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR class="SCXW153963261 BCX0" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="-" data-font="Aptos" data-listid="10" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;‘View Logs’ role&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="-" data-font="Aptos" data-listid="10" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/iam-policystatements#storage-logs-read" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;‘storage:logs:read’&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; through a default policy like ‘Read Logs’ or through a custom policy like this:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;//Grail read data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW storage:buckets:read WHERE storage:table-name = "logs";&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW storage:logs:read;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;and a policy boundary applied with the following condition:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;storage:bucket-name = 'default_logs';&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The ‘View Logs’ role assignment will bypass the attribute conditions set in the policy and boundary, when those two are applied to the group. This means users of the group will be able to read logs from all buckets.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To fix this, you can remove the role assignment and instead express it in an existing or new policy assigned to the same group, like this:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;//Classic&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW environment:roles:logviewer;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Do not forget to apply the policy boundary to the new policy you modified.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2025 13:36:04 GMT</pubDate>
    <dc:creator>Jon2</dc:creator>
    <dc:date>2025-01-27T13:36:04Z</dc:date>
    <item>
      <title>‘View Logs’ role seems to be bypassing conditional access for Grail storage. Is this true?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/View-Logs-role-seems-to-be-bypassing-conditional-access-for/m-p/268458#M35518</link>
      <description>&lt;P&gt;Will&amp;nbsp;&lt;SPAN class="TextRun SCXW2267035 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW2267035 BCX0"&gt;users or the group be able to read logs from all buckets?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 13:10:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/View-Logs-role-seems-to-be-bypassing-conditional-access-for/m-p/268458#M35518</guid>
      <dc:creator>GosiaMurawska</dc:creator>
      <dc:date>2025-01-27T13:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: ‘View Logs’ role seems to be bypassing conditional access for Grail storage. Is this true?</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/View-Logs-role-seems-to-be-bypassing-conditional-access-for/m-p/268459#M35519</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN class="TextRun SCXW153963261 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;“&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A class="Hyperlink SCXW153963261 BCX0" href="https://docs.dynatrace.com/docs/shortlink/role-based-permissions-for-environment-access#environment" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class="TextRun Underlined SCXW153963261 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0" data-ccp-charstyle="Hyperlink"&gt;View Logs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="TextRun SCXW153963261 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;” &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;is a permission of type ‘role&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;’&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; and as such&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; it does not adhere to &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;attribute-based conditions. Consider&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; for example&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt; that one of your user groups has been assigned&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153963261 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop SCXW153963261 BCX0"&gt;&lt;SPAN class="SCXW153963261 BCX0"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR class="SCXW153963261 BCX0" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="-" data-font="Aptos" data-listid="10" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;‘View Logs’ role&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="-" data-font="Aptos" data-listid="10" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/iam-policystatements#storage-logs-read" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;‘storage:logs:read’&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; through a default policy like ‘Read Logs’ or through a custom policy like this:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;//Grail read data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW storage:buckets:read WHERE storage:table-name = "logs";&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW storage:logs:read;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;and a policy boundary applied with the following condition:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;storage:bucket-name = 'default_logs';&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The ‘View Logs’ role assignment will bypass the attribute conditions set in the policy and boundary, when those two are applied to the group. This means users of the group will be able to read logs from all buckets.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To fix this, you can remove the role assignment and instead express it in an existing or new policy assigned to the same group, like this:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;//Classic&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;ALLOW environment:roles:logviewer;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Do not forget to apply the policy boundary to the new policy you modified.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1080}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 13:36:04 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/View-Logs-role-seems-to-be-bypassing-conditional-access-for/m-p/268459#M35519</guid>
      <dc:creator>Jon2</dc:creator>
      <dc:date>2025-01-27T13:36:04Z</dc:date>
    </item>
  </channel>
</rss>

