Skip to content

 

TrustLogix for AWS Redshift

Amazon-redshift-1

TrustLogix provides visibility, recommendations, fine-grained data access controls, and audit across AWS Redshift clusters from a single pane of glass

TrustLogix-AWS-Redshift-Graphic

Data monitoring & insights

Gain visibility into data access risks with actionable insights and recommendations.

Redshift Risk Activities

Total visibility

TrustLogix gives you a birds-eye view across all your Redshift instances, and detects over-privileged users and anonymous behavior that could indicate data exfiltration attempts

Actionable insights

TrustLogix analyzes Redshift data usage patterns and makes recommendations on how to tighten your data access governance policies to eliminate overly granted privileges and reduce risk

Granular Data Entitlements

Rapidly model, deploy, and enforce granular data access controls and data masking at row and column levels—ensuring that security, privacy, and compliance requirements are easily and consistently enforced across all Redshift clusters from a single pane of glass

Entrprise-Data-Warehose-Redshift

RBAC Integration

TrustLogix's RBAC integration enables seamless data entitlements policies by leveraging AWS IAM Roles directly from the TrustLogix console

RLS Integration for Row-Level Security

TrusLogix integrates with Redshift RLS to deliver fine-grained row-level security for your sensitive data

Column Masking for Privacy Mandates

Mask sensitive Redshift data like account numbers, credit cards, and other PII and PHI to cmply with legislative requirements like HIPAA, PCI, and GDPR

Codify Business Rules as Data Entitlements

The TrustLogix-Redshift integration lets you model business rules as fine-grained data entitlements directly from the TrustLogix console

Secure Data Sharing

Monitor and enforce fine-grained data entitlements for third-party data as it gets refactored and flows through Redshift for consumption by internal and external users

Redshift-Secure-Data-Sharing

Track Data Flow To and Through Redshift

TrustLogix lets you track how upstream data is consumed in Redshift and alerts you if it gets moved in anomalous frequencies or volumes

Enforce Policies Downstream

TrustLogix enforces your fine-grained Redshift policies even if your data scientists and analysts repackage third-part data into new products and services, and regardless of how consumers connect to Redshift to access that data

Honor Upstream Data Governance Mandates

TrustLogix enforces data access requirements in Redshift from upstream sources to ensure you're complying with SLAs and terms of use

Running in Minutes, Productive in Hours

You can be up and running, and productive with TrustLogix in just a few hours

Step 1

Register a Redshift Cluster with TrustLogix in just a few minutes. We will immediately start analyzing your existing policies and cross-referencing them with the past 90 days of data access history

Step 2

TrustLogix will begin delivering insights about inappropriate access and over-privileged users and roles, and making recommendations for tightening up your data access control policies

Step 3

Your Data Security team can then model those recommendations using the TrustLogix console to deliver fine-grained data entitlements for your Redshift infrastructure

AWS Services supported

Amazon-S3
Amazon-Dynamo
Amazon-RDS
Amazon-Glue
Amazon-Private-Link
Amazon Redshift
AWS-IAM-Logo
Amazon EMR

Additional Resources

Subscribe to TrustLogix on the AWS Marketplace