Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Widget Connector
urlhttps://www.youtube.com/watch?v=FXRih1bzZaQ

Overview

This topic explains your options for creating Vormetric policy rules and how to configure these rules in your DSM (Data Security Manager). These rules will determine who or what has access to your encrypted data.

...


What Are Policy Rules?

A policy rule is a statement that gives you options to allow, deny, apply an encryption key, and audit access attempts on a GuardPoint based on a combination of 6 criteria. The policy rules are analyzed in descending order, similar to firewall rules, which means the order of these rules is important. 

...

Expand
title6. Rule Criteria (Effect) 

The Effect field must be completed; this is the only mandatory field to complete in order to create a policy rule.

The Effect field will either permit or deny access, and additionally, determine if the rule should be audited or if the encryption key will be applied.

The following table shows the available options:

Type of EffectAction
PermitPermits access to the data.
Deny

Denies access to the data.

Apply KeyEncrypts the data written into the GuardPoint with the key specified in the Key Selection Rules tab.
Audit

Creates an entry in the Message Log that describes:

  • What data was accessed
  • When the data was access
  • The applied security rule


Next Steps

Next, Introduction to GuardPoints and the Copy Method.