Skip to main content
Version: v4.14

Manage repo-level policies

The Policies tab in the Data Repository Details page allows you to view and manage repo-level policies for a given data repository.

The following types of repo-level policies are supported and they are explained in details in the next sections:

Create a repo-level policy

To add or manage a repo-level policy in the Cyral control plane UI, follow the steps below:

info

Keep in mind the following restrictions:

  • Each repo-level policy applies to a single repository (for example, a specific database).
  • If multiple policies (including Cyral global policy rules) apply to a given database operation, then the effect of all policies are composed to provide least-privilege access. See Policy evaluation for details.
  1. Click Data Repos ➡️ your repository's name ➡️ Policies.

  2. Click Add policy and select a policy template from the list of supported policy types to start the policy wizard.

  3. In the Describe panel:

    • Give your policy a name and optional description. This policy will be visible only within this repository's configuration.
    • Optionally, you can add one or more Policy Type tags to the policy. To do this, type your tag name in the field below Policy Types and then click Add.
    • Click Next.
  4. In the Policy parameters screen, provide the settings as prompted. The types of policies and their required parameters are explained in Repo-level policy types section.

  5. In the Who this policy applies to panel, choose the identities (SSO users, Emails or Groups) and/or database accounts this policy will cover. See Specify who this policy applies to for details.

  6. The UI will display a read-only summary of the newly configured policy. Click Add to add the policy.

Your policy is enabled by default, which means it takes effect immediately. To manage, disable, and enable your policy, use its card in the Policies panel.

Edit, enable, disable or delete a repo-level policy

To edit, enable, disable or delete a repo-level policy in the Cyral control plane UI, follow the steps below:

  1. Click Data Repos ➡️ your repository's name ➡️ Policies.

  2. Click on the desired policy.

  3. Click Configure and choose Edit, Enable, Disable or Delete.

Repo-level policy types

Cyral provides several types of repo-level policies that can be created through a wizard in the Cyral control plane. The following sections describes the supported repo-policy level types and how to configure them using the policy configuration wizard upon creation or edition of a policy.

Data Firewall

A data firewall policy limits which records or rows users can read from a specific location (for example, a table) in your data repository. A data firewall policy applies to all users other than those you explicitly allow (exempt) in the policy.

  • In the Specify who can see restricted records panel, use the Specify exempt identities box to see the users, emails and groups who will be allowed to read the data. All the listed entries will be allowed to read the data unless blocked by another policy. Use the Add button to add identities (SSO users, Emails or Groups) allowed to read the data.
  • In the Specify when to apply this policy panel, list the data locations this policy covers.
    • Specify the Data Labels this policy applies to.
    • In the Data Set field, specify the dataset or data location that this policy applies to. This name is case insensitive.
      • For most database types, this is a fully qualified table name in the form <schema>.<table>
      • For Snowflake, this is a fully qualified table name in the form <database>.<schema>.<table>
  • In the Specify how records will be restricted panel, type an expression that must evaluate to TRUE in order for the record or row to be blocked. Records matching this expression will be blocked for the users covered by this policy. Use the same syntax you would use in a WHERE clause.

Data Masking

Mask repository fields for specific users and applications.

  • In the Specify masking parameters panel:
    • Choose the Masking Type. It can be one of: Null Mask, Constant Mask or Format-Preserving Mask. See mask types for more information.
    • Specify the Data Labels the policy applies to.
  • In the Who this policy applies to panel, choose identities (SSO users, Emails or Groups) and/or database accounts this policy will cover. See Specify who this policy applies to for details.

Data Protection

Guard against unauthorized reads, updates, and deletes in specified fields in your database. You can choose whether this policy blocks the action or only sends an alert when the action occurs. This policy type has the parameters:

  • In the Database Operations section, choose the types of actions this policy will apply to (reads, updates, and/or deletes)
  • In the Data Labels section, specify the data labels this policy applies to, and click Next.
  • In Policy Actions, specify:
    • Alert to send an alert and allow the operation to proceed.
    • Alert and Block to send an alert and block the operation.
  • In the Who this policy applies to panel, choose the identities (SSO users, Emails or Groups) and/or database accounts this policy will cover. See Specify who this policy applies to for details.

See also blocking access in global policies.

Rate Limit

Implement threshold on sensitive data reads over a period of time per user. You can choose whether this policy blocks the action or only sends an alert when the action occurs.

  • Define the Maximum number of rows that can be returned per hour.
  • In the Data Labels section, specify the data labels this policy applies to, and click Next.
  • In Policy Actions, specify:
    • Alert to send an alert and allow the operation to proceed.
    • Enforce to block the operation when the rate limit is achieved.
  • In the Who this policy applies to panel, choose the identities (SSO users, Emails or Groups) and/or database accounts this policy will cover. See Specify who this policy applies to for details. Cyral tracks the rate limit quota per user, meaning that if the identity is a group, each user in this group will have his/her own quota.

See also blocking access in global policies.

Read Limit

Prevent certain records from being read beyond a specified limit. You can choose whether this policy blocks the action or only sends an alert when the action occurs. This policy type has the parameters:

  • Type the Maximum number of rows that can be modified per query, and click Next.
  • In Apply this policy to, specify:
    • The entire repository to police queries (in the whole repository) surpassing the number of records.
    • Specific data labels to specify the data labels this policy applies to.
  • In Policy Actions, specify:
    • Alert to send an alert and allow the operation to proceed.
    • Alert and Block to send an alert and block the operation.
  • In the Who this policy applies to panel, choose the identities (SSO users, Emails or Groups) and/or database accounts this policy will cover. See Specify who this policy applies to for details.

See also blocking access in global policies.

Repository Protection

Alert when more than a specified number of records are being updated or deleted across the repo. This policy type has the parameters:

  • In the Database Operations section, choose the types of actions this policy will apply to (updates, and/or deletes)
  • Type the Maximum number of rows that can be modified per query, and click Next.
  • In the Who this policy applies to panel, choose the identities (SSO users, Emails or Groups) and/or database accounts this policy will cover.

Service Account Abuse

Alert when database accounts are used in passthrough authentication, meaning when clients authenticates directly to the database using the database account credentials.

  • In the Specify which accounts to alert for panel, specify database accounts for which end user attribution is always required, meaning that an alert will be created when the given accounts are used to read, update or delete data without end user attribution.

User Segmentation

A user segmentation policy applies to a set of users you specify, and it limits which rows or records those users can read from a table or collection in your database.

  • In the Specify who is limited to a subset of records panel, choose the set of users whose query results will be limited by this policy. You can either apply this policy to identities (SSO users, emails, and groups) or to database accounts.
  • In the Specify when to apply this policy panel, you'll list the data locations this policy covers.
    • Specify the Data Labels this policy applies to.
    • In the Data Set field, specify the dataset or data location that this policy applies to. This name is case insensitive.
      • For most database types, this is a fully qualified table name in the form <schema>.<table>
      • For Snowflake, this is a fully qualified table name in the form <database>.<schema>.<table>
  • In the Specify how records will be restricted panel, type an expression that must evaluate to TRUE in order for the record or row to be blocked. Records matching this expression will be blocked for the users covered by this policy. Use the same syntax you would use in a WHERE clause.

Stored Procedure Governance

A stored procedure governance policy applies to sets of users and database accounts, and controls execution of stored procedures.

note

This functionality is not available for Snowflake on Cyral version 4.14.

  • In the Specify policy parameters panel, add the names of all the stored procedures for which you want to have execution control. In that same screen, you can also choose whether to alert on or block the execution.