Advanced configuration self managed
Custom IAM Roles¶
Goal¶
Facilitate fine-grained access control within your BigQuery integration by utilizing custom IAM roles that are automatically created by PolicySync, or alternatively, manage them manually.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Steps¶
Warning
All values displayed below are for illustrative purposes only. Please replace them with your actual values.
Please modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector.
-
CONNECTOR_BIGQUERY_CREATE_CUSTOM_IAM_ROLES
- Enable this property if you wish for PolicySync to automatically create custom IAM roles in your GCP project or organization. This will facilitate fine-grained access control.
-
Important
If this property is disabled (false
), you will need to create all custom IAM roles manually within your GCP project or organization.
-
CONNECTOR_BIGQUERY_CUSTOM_IAM_ROLES_SCOPE
- This property defines the scope in which custom IAM roles will be created and utilized.
- Set this property to
project
if you wish for custom IAM roles to be created and utilized at the individual project level. - Set this property to
org
if you wish for custom IAM roles to be created and utilized at the organization level. - If you wish to create custom IAM roles manually at the organization level, they will be used across all managed projects within that organization.
-
CONNECTOR_BIGQUERY_ORGANIZATION_ID
- If you opt to use organization-level IAM roles (by setting
CONNECTOR_BIGQUERY_CUSTOM_IAM_ROLES_SCOPE
toorg
), please specify your GCP organization ID in this field. -
Note
This property is required only when custom IAM roles are created at the organization level.
- If you opt to use organization-level IAM roles (by setting
Filter database, schema, and tables from access management¶
Goal¶
- You wish to manage access permissions for a specific dataset and table in BigQuery.
- You wish to exclude specific datasets and tables from access management in BigQuery.
- You wish to manage access permissions for all tables within BigQuery.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Steps¶
Warning
All values displayed below are for illustrative purposes only. Please replace them with your actual values.
Please modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector:
- You can provide a comma-separated list of project, dataset and table names.
- You can use
*
as a wildcard character. - For dataset, the format is
<project_id>.<dataset>
. - For table, the format is
<project_id>.<dataset>.<table>
. - The ignore list takes precedence over the manage list. If a project, dataset, or table appears in both lists, it will be excluded.
- These entries are case-sensitive.
- If you set a MANAGE list value to empty, it will manage all objects of that type. You can use this to manage all objects within a project.
Filtering Privacera user, group, and role names¶
Goal¶
You wish to manage access permissions for a specific set of Privacera users, groups, and roles within your BigQuery environment.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Steps¶
Warning
All values displayed below are for illustrative purposes only. Please replace them with your actual values.
Please modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector:
- You can provide a comma-separated list of user, group, and role names.
- You can use
*
as a wildcard character. - The ignore list takes precedence over the manage list. If a user, group, or role appears in both lists, it will be excluded.
- If you wish to manage all users, you can skip specifying these properties.
Access Control Management¶
Goal¶
Enable advanced access control management for BigQuery by configuring row filters and masking policies using native BigQuery functionality or secure views.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Native Row Filter and Tag Masking¶
Steps¶
Modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector.
Secure View Row Filter and Masking¶
Steps¶
Modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector.
The following properties define how access control mechanisms are managed within BigQuery:
-
CONNECTOR_BIGQUERY_ENABLE_ROW_FILTER
- Description: Enables native BigQuery row filters.
- Recommended Setting:
false
-
CONNECTOR_BIGQUERY_ENABLE_VIEW_BASED_MASKING
- Description: Enables masking policies using secure views.
- Recommended Setting:
true
-
Recommendation
Text Only 1
View-based masking is preferred since BigQuery does not support native masking.
-
CONNECTOR_BIGQUERY_ENABLE_VIEW_BASED_ROW_FILTER
- Description: Enables row filter policies using secure views.
- Recommended Setting:
true
-
CONNECTOR_BIGQUERY_SECURE_VIEW_CREATE_FOR_ALL
- Description: Creates secure views for all tables and views, regardless of existing masking or row filter policies.
- Recommended Setting:
false
Access Audits Management¶
Goal¶
Enable and manage access audits in BigQuery through PolicySync, allowing detailed tracking and filtering of access events.
Prerequisites¶
- You have successfully installed Privacera Manager and have the base installation operational.
- You have configured the connector for BigQuery or are in the process of doing so.
Steps¶
Warning
All values displayed below are for illustrative purposes only. Please replace them with your actual values.
Please modify the following properties in the vars.connector.bigquery.yml
file located in the instance directory of the connector.
-
CONNECTOR_BIGQUERY_AUDIT_ENABLE
- Set this property to
true
if you want to enable access audit fetching from BigQuery. - When enabled, PolicySync will gather access audit data from the specified BigQuery project and dataset.
- Set this property to
-
CONNECTOR_BIGQUERY_AUDIT_EXCLUDED_USERS
- This property is used to specify a list of users whose access audits should be excluded by PolicySync.
- Provide a comma-separated list of email addresses for users whose access events should be excluded from the audit logs.
-
CONNECTOR_BIGQUERY_AUDIT_PROJECT_ID
- Specify the project ID from which BigQuery audits should be retrieved.
- This is the GCP project where the audit logs are stored and queried.
-
CONNECTOR_BIGQUERY_AUDIT_DATASET_NAME
- Specify the dataset name that will be used to query and retrieve access audits from BigQuery.
- This is the dataset within the project that contains the audit information.