Skip to content

Latest commit

 

History

History
42 lines (16 loc) · 1.78 KB

data-protection-and-privacy-in-the-kyma-environment-935e241.md

File metadata and controls

42 lines (16 loc) · 1.78 KB

Data Protection and Privacy in the Kyma Environment

To protect any confidential and personal data from leakage or misuse, you must store and process it safely.

In the Kyma environment you can store and process data, such as configuration files or specifications. To protect the confidentiality of your information, store only public data. Don't use the environment to process and store any kind of confidential information, including personal data.

A Kyma runtime collects two log types: audit and application.

Audit Logs

A Kyma runtime collects audit logs for configuration changes to the runtime itself, Kubernetes API server, and security events. Usually, those logs contain the user account (technical account or email address) and the client IP address of the subject who triggered the changes. No other personal data is stored in the audit logs. On average, the logs store the data for 90 days. If you want to store any other personal data, be cautious and bear in mind the recommendations provided in Data Protection and Privacy.

Application Logs

A Kyma runtime collects access logs and application logs provided by the Kyma system components. Those logs reflect regular events that occurred in a Kyma runtime and should not include any personal or sensitive data.

You can retrieve information stored in the audit log system. To do so, open a support ticket.