Input Sensitive Information Management
By registering regular expressions, sensitive information is protected by controlling the text inputted by users in the business system (app/URL input field).
Register Regular Expression
1. Start of regular expression registration
- Click on the "Manage Sensitive Information Input" submenu under the business system.
- Click the [+Register Regular Expression] button.
- The "Register Regular Expression" slide panel will open on the right.
2. Basic Information Input for Regular Expressions
Name (required)
- Enter a name that can identify the regular expression.
- For example: "Resident Registration Number", "Credit Card Number", "Mobile Phone Number", etc.
Description (optional)
- A detailed explanation of the corresponding regular expression will be entered.
- Specifies what types of sensitive information are detected.
3. Regular Expression Pattern Input (Required)
Writing Regular Expressions
- Enter the pattern of the sensitive information you want to detect using a regular expression.
4. Regular Expression Test
Test text input
- Enter sample data in the "Regular Expression Test" input field.
- You can check in real-time whether the entered regular expression matches correctly.
Check Matching Results
- Display success message when matching regular expression:
- If it does not match the regular expression: Display the error message "An unmatched regular expression has been entered."
- A complete pattern must match to be recognized as correct.
5. Save Regular Expression
- After entering all the information and completing the test, click the [Register] button.
- Clicking the [Cancel] button will close the panel without saving the entered information.
Regular Expression List Management
Each regular expression is managed with a unique name, and you can select and use it from this list later when setting policies.
Input sensitive information policy settings
After registering the regular expression, you can set the following detailed conditions through separate policy settings:
1. Policy Basic Information
- Policy Name: A name that can identify the policy
- Members: Members to whom the policy will apply
- DescriptionDetailed description of the policy
2. Select Target System
- All business systemsApply policies to all registered business systems.
- specific business system: Apply only to specific systems by directly entering the URL.
3. Selecting Regular Expressions
- Select a pattern to apply from the pre-registered list of regular expressions.
- You can select and use multiple regular expressions.
4. Setting Conditions
- Location conditions: Apply policy only at specific locations
- Time conditions: Apply policy only during specific time zones
- Device Conditions: Apply policy only on specific device types
5. Audit Policy
- Log Recording Options: Record only blocked or record both allowed and blocked
- Log Detail: Whether to include user input text content
6. Policy Activation
- Settings: Policy activation/deactivation status
- Expiration Date: Setting Policy Application Period
Policy List Management
Check policy list
The registered policies are displayed in a list.
Setting Policy Priorities
- You can change the order of policies by dragging and dropping them in the policy list.
- The higher the order, the higher the priority.
- When multiple policies can be applied simultaneously, the policies with higher priority are processed first.
Policy Modification and Deletion
- You can select a registered policy to modify or delete it.
- The same settings screen will appear when modifying the policy.
Log records
- All detection and blocking events are logged according to the configured audit policy.
- When text matching the regular expression is detected, it is immediately masked and logged.
- The log includes the time, user, applied policy, detected content, and so on.