This topic provides a description of the configurable options for a Decoder or Log Decoder in the Data Privacy tab.
In the Data Privacy tab, Administrators can configure data privacy parameters for certain Core services. For the Decoder and Log Decoder, you can set the default hash algorithm and salt.
To access this tab:
- In the Security Analytics menu, select Administration > Services.
- Select a Decoder or Log Decoder service and click > Config.
The General tab is displayed.
- Click the Data Privacy tab.
The Data Privacy tab has the Configure Hash Algorithm and Salt configuration settings. The following table describes the parameters in this tab.
|Hash Algorithm||Displays a drop-down list of hash algorithms to use for any keys with a transform that does not specify algorithm type. Possible values are SHA-256 and Duplicate. Duplicate is a special algorithm available for administrators to use when validating that expected hashing behavior is occurring in the network. In versions of Security Analytics prior to 10.5, SHA-1 was available as a hash algorithm, but RSA does not recommend use of SHA-1.|
|Salt||Indicates the optional salt value prepended to any value that is hashed. Best practices for security purposes dictate a salt value that is no less than 100 bits or 16 characters in length. Configuring a value ensures that obfuscated values are unique to this site and therefore more difficult to deduce. For more information on this field, see the Configure Data Obfuscation topic in the Data Privacy Management guide.|
|Apply||Applies any changes.|