Scan Rules

Configure scan rules to align with your organization's data processing agreements (DPA) with third-party integrations and other privacy policies. This allows you to define a whitelist of sensitive data permitted across storage mediums and third-party integrations. For example, Datadog may be allowed to receive emails and usernames, while other PII will be flagged as potential leaks. By aligning with your organization’s policies and data processing agreements, the scanner enables you to identify and address DPA violations caused by PII oversharing. It ensures violations are caught and resolved before code is deployed to production, preventing issues from occurring in the first place.

This page allows you to view the scan rules using advanced filters covering:

  • Repository
  • Data Sink
  • Status

You can configure the scan rule for an individual row by clicking on the Edit icon, or you can select multiple rows and apply bulk changes by clicking either Disable Selected to disable those scan rules or Edit Allowed Data Elements to apply a whitelist of data elements to all selected rows.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
On This Page
Scan Rules