主权项 |
1. A computer-implemented method for hiding sensitive data in log files, the method comprising:
intercepting, by a log interceptor for hiding the sensitive data in the log files, a write operation of an application, wherein the log interceptor is embedded within an operating system and runs as a daemon in background, wherein the log interceptor comprises an analytics engine and the analytics engine provides a confidence index that determines whether patterns and information in message content of the write operation are sensitive; getting, by the log interceptor, content of the write operation, in response to determining that the write operation is for a log file; checking, by the log interceptor, a knowledge base, the knowledge base comprising information for the sensitive data, the information for the sensitive data including names of log files that applications write and customer sensitive information; identifying, by the log interceptor, the sensitive data in the content of the write operation, by using the confidence index; masking, by the log interceptor, the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; writing, by the log interceptor, in the log file, modified content in which the sensitive data is masked; and updating, by the log interceptor, the knowledge base, by storing information of masking the sensitive data in the write operation. |