Skip to main content

Release Notes

New Features in This Release

Policies

To learn more, see “Policies” in the DSP Platform User Guide.

Changing Default Transformation Policy

You can change the default transformation policy from the drop field transformation type to the redact with NULL transformation type.

Policy Workflow

When you create or edit a policy (including adding or editing a rule within that policy), it now enters an approval workflow in which a data guardian must approve or reject the new or modified policy and rules.

Conditional Transformation Policies

To refine the activation of a policy and its rules, you can add a trigger to a policy so its rules are only applied under the trigger conditions specified.

Rules

To learn more, see “Rules” in the DSP Platform User Guide.

Cell-Level Transformations

You can define a transformation rule to apply different transformations for distinct records of the same field (column), that is, a cell, based on varying conditions in another field (column).

Data Transformations

To learn more, see “Transformations” in the DSP Platform User Guide.

Redact with NULL

You can use this privacy enhancing technology (PET) to replace the field values in a column with NULL, and preserve the schema of the asset after the data transformation.

APIs

To learn more, see “The Platform APIs” in the DSP API User Guide.

REST API for Access Control Policies

The Access Control Policy API has endpoints to create, read, update, and delete an access control policy. You can also:

  • view details of an access control policy's rejection message

  • submit an access control policy for review

  • acknowledge that an access control policy has been rejected during a review by returning it to either the Draft or Draft Update state

REST API for Access Control Policy Rules

The Access Control Policy Rule API has endpoints to create, read, update, and delete an access control policy rule. You can view the details of every access control policy rule in a specified policy, or view a single access control policy rule by its ID.

REST API for Attributes

The Attribute API has endpoints to read all location attribute types, or read all purpose attribute types. This is useful when creating connections, assets, or projects via an API.

REST API for Connections

The Connections API has endpoints to create, read, update, and delete a connection. You can find all connections or search for a specific connection by connection ID.

REST API for Data Planes

The DataPlanes API has endpoints to view all data planes or to view data planes within a single exchange. This is useful when creating connections via an API.

REST API for Projects

The Project API has endpoints to create, read, update, and delete a project. You can also:

  • view (GET) all projects

  • view all the proxy URLs of a project

  • submit a project for review

  • update the list of assets associated with a project

REST API for Tasks

The Task API has endpoints to view all asset, policy, and project requests, to approve or disapprove a specific asset or project request by ID, and to publish or reject a policy.

REST API for Transformations

The Transformation API has endpoints to create, read, update, and delete a transformation. You can find all transformations or search for a specific transformation by transformation ID.

REST API for Transformation Policies

The Transformation Policy API has endpoints to create, read, update, and delete a transformation policy. You can also:

  • view a transformation policy's rejection message

  • acknowledge that a transformation policy has been rejected during a review by returning it to either the Draft or Update Draft state, depending on whether the policy is being created or updated

  • create policies that include conditional triggers

REST API for Transformation Policy Rules

The Transformation Policy Rule API has endpoints to create, read, update, and delete an asset. You can also reorder the transformation policy rules within a specified policy.

Logging

To learn more, see “System Logs and Auditing” in the DSP Platform Administration Guide.

Audit Logs for Data Guardians and System Administrators

  • provide information on how data is provisioned (who requested the data, the data that was requested, and the transformations applied)

  • provide information on the creation of or changes to any object, including projects, assets, policies, and rules

The platform now uses Fluentbit log collector which uses input and output plug-ins to:

  • collect data from multiple sources

  • distribute or send data to various destinations, such as your preferred security information and event management (SIEM) solution

Integrations

Denodo

You can now configure Denodo Design Studio to query data on the platform. Set up base views in Denodo and launch data queries from Denodo or with a business intelligence tool.

The Privitar Data Security Platform​ v1.1.0 is compatible with Denodo Platform v8.0 with the following data sources:

  • Apache Hive v3.1.2+

  • Apache Spark v3.0.1+