{"id":5478,"date":"2014-07-08T11:53:26","date_gmt":"2014-07-08T15:53:26","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=5478"},"modified":"2019-12-30T18:26:24","modified_gmt":"2019-12-30T23:26:24","slug":"web-log-data-masking","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/","title":{"rendered":"How to Mask Data in Web Logs"},"content":{"rendered":"<p><em>This article is third in a 3-part series on CLF and ELF web log data. We first introduced\u00a0<a title=\"CLF and ELF Web Log Formats Blog\" href=\"http:\/\/www.iri.com\/blog\/migration\/data-migration\/clf-elf-web-log-formats\/\" target=\"_blank\" rel=\"noopener\">CLF and ELF web log formats<\/a>, then introduced\u00a0IRI solutions for <a title=\"CLF and ELF Web Log Data Processing Blog\" href=\"http:\/\/www.iri.com\/blog\/data-transformation2\/clf-elf-web-log-data-processing\/\" target=\"_blank\" rel=\"noopener\">processing web log data<\/a>, and here we conclude by\u00a0masking private data in\u00a0web log\u00a0files.\u00a0<strong>Note\u00a0<\/strong>that this article specifically addresses the masking of structured web log files via <a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><strong>IRI FieldShield<\/strong><\/a>, while other web, application, and device log formats that are semi- or un-structured can be scanned for PII and masked using <strong><a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a><\/strong>. The <a href=\"https:\/\/www.iri.com\/products\/voracity\">IRI Voracity<\/a> data management platform includes both tools, plus the ability to cleanse, manipulate, remap, and report from various log and message formats.<\/em><\/p>\n<p>Web log files are created by, and stored\u00a0on, website servers to track visitors&#8217;\u00a0<a href=\"http:\/\/www.iri.com\/solutions\/business-intelligence\/embedded-bi\/clickstream-analytics\" target=\"_blank\" rel=\"noopener\">clickstream<\/a> information trail. Some of the\u00a0information in these logs is sensitive\u00a0or\u00a0personally identifiable.<\/p>\n<p>As we know from articles in the data masking sections of IRI&#8217;s <a href=\"http:\/\/www.iri.com\/blog\/category\/data-protection\/\" target=\"_blank\" rel=\"noopener\">blog<\/a> and <a href=\"http:\/\/www.iri.com\/solutions\/data-masking\" target=\"_blank\" rel=\"noopener\">website<\/a>, there are multiple ways to shield personally identifiable information (PII)\u00a0or\u00a0otherwise\u00a0sensitive data in structured sources. String masking, for example, covers over (or redacts) original values using\u00a0other\u00a0characters. Encryption,\u00a0<a href=\"http:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\" target=\"_blank\" rel=\"noopener\">on the other hand<\/a>, produces ciphertext that de-identifies the original value, but allows its restoration (decryption).<\/p>\n<p><a href=\"http:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener\">IRI FieldShield<\/a> software protects\u00a0PII in databases and many other <a href=\"http:\/\/www.iri.com\/products\/workbench\/data-sources\" target=\"_blank\" rel=\"noopener\">data sources<\/a> &#8212; including\u00a0web logs &#8212; with multiple field-level security <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\">functions<\/a>. FieldShield can mask, encrypt, delete, or randomize IP addresses, along with other items subject to data protection and privacy laws. FieldShield also supports pseudonymization, hashing, redaction, and sub-string manipulation of data in structured file formats.<\/p>\n<p>Consider the sample Extended Log Format (ELF) file below. It contains the visit date, time, IP address, server IP address, port, protocol, number of transferred bytes, and the URL of the opened page:<\/p>\n<pre>2014-05-24,12:55:15,32.09.130.15,96.48.225.22,GET,80,200,10801,\"http:\/\/www.iri.com\/products\/fieldshield\/why-is-fieldshield-better\"\r\n2014-05-24,20:55:15,96.47.227.21,96.46.220.42,GET,80,200,10801,\"http:\/\/www.iri.com\/solutions\/data-masking\/encryption\/format-preserving-encryption\"\r\n2014-05-24,22:18:01,12.41.114.23,96.45.225.98,GET,80,200,10801,\"http:\/\/www.iri.com\/solutions\/data-masking\/de-identification\/overview\"\r\n2014-05-24,13:15:06,96.46.230.79,96.47.126.99,GET,80,200,10801,\"http:\/\/www.iri.com\/products\/workbench\/fieldshield-gui\/apply-rules\"\r\n2014-05-24 23:15:06,96.45.226.19,95.47.214.50,GET,80,200,10801,\"http:\/\/www.iri.com\/blog\/data-protection\/data-risk-fieldshield-mitigation\/\"\r\n2014-05-25,23:15:22,11.11.111.11,95.47.214.50,GET,80,200,10801,\"http:\/\/www.iri.com\/blog\/test-data\/rowgen-v3-automates-database-test-data-generation\/\"<\/pre>\n<p>Use the <em>Encryption and Decryption<\/em> dialog in the\u00a0<a href=\"http:\/\/www.iri.com\/products\/workbench\/fieldshield-gui\" target=\"_blank\" rel=\"noopener\">IRI Workbench<\/a> GUI for FieldShield to apply field-level encryption. Below is an example of encrypting each\u00a0visitor&#8217;s IP address with a<em> format-preserving<\/em> AES-256 function:<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Capture.png\"><img decoding=\"async\" class=\"aligncenter wp-image-5628 size-full\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Capture.png\" alt=\"Capture\" width=\"413.5\" height=\"272\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Capture.png 827w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/Capture-300x197.png 300w\" sizes=\"(max-width: 827px) 100vw, 827px\" \/><\/a><\/p>\n<p>Similar dialogs exist for string masking, pseudonymization, randomization, hashing, de-ID, encoding, etc.<\/p>\n<p>The portable FieldShield job script created automatically in the GUI (or by hand, if you prefer), reflects both field encryption and redaction:<\/p>\n<pre>\/INFILE=rawlog.elf\r\n\u00a0\u00a0 \/PROCESS=ELF\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(DATE, POSITION=1,TYPE=ASCII, SEPARATOR=\" \")\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(TIME, POSITION=2,TYPE=ASCII, SEPARATOR=\" \")\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(C_IP, POSITION=3, SEPARATOR=\" \", TYPE=IP_ADDRESS)\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(S_IP, POSITION=4, SEPARATOR=\" \", TYPE=IP_ADDRESS)\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(CSMETHOD, POSITION=5,TYPE=ASCII, SEPARATOR=\" \") \r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(S_PORT, POSITION=6, SEPARATOR=\" \")\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(STATUS, POSITION=7, SEPARATOR=\" \")\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(BYTES, POSITION=8, SEPARATOR=\" \")\r\n\u00a0\u00a0\u00a0\u00a0\u00a0 \/FIELD=(CS_URI_STEM, POSITION=9, SEPARATOR=\" \",TYPE=ASCII,FRAME='\"')\r\n   \/OMIT WHERE C_IP EQ \"11.11.111.11\"\r\n\r\n\/OUTFILE=maskedlog.elf\r\n\u00a0\u00a0 \/PROCESS=ELF\r\n\u00a0\u00a0 \/HEADREC=\"DATE        TIME    MASKED IP    CS_URI_STEM\\n\\n\"\r\n      \/FIELD=(DATE, POSITION=1, SIZE=12, TYPE=ASCII)\r\n      \/FIELD=(TIME, POSITION=15, SIZE=10, TYPE=ASCII)\r\n \u00a0\u00a0\u00a0\u00a0 \/FIELD=(ENC_AES256_C_IP=<strong>enc_fp_aes256_alphanum(C_IP)<\/strong>, POSITION=30, SIZE=12, TYPE=IP_ADDRESS)\r\n      \/FIELD=(<strong>replace_chars(CS_URI_STEM , \"*\",7, 8, \"#\", 30, 8<\/strong>), POSITION=45, SIZE=55, TYPE=ASCII)\r\n<\/pre>\n<p>After running the script, we get the ELF-style output desired\u00a0&#8230;\u00a0 but in fixed position, and compliant with privacy regulations.<\/p>\n<pre>DATE        TIME    MASKED IP    CS_URI_STEM\r\n2014-05-24 12:55:15 32.09.130.15 http:\/********.com\/products\/f########ld\/why-is-fieldshi\r\n2014-05-24 13:15:06 05.07.569.95 http:\/********.com\/products\/w########\/fieldshield-gui\/a\r\n2014-05-24 20:55:15 98.68.117.52 http:\/********.com\/solutions\/########king\/encryption\/fo\r\n2014-05-24 22:18:01 69.67.212.32 http:\/********.com\/solutions\/########king\/de-identifica\r\n2014-05-24 23:15:06 42.01.555.73 http:\/********.com\/blog\/data-########on\/data-risk-field<\/pre>\n<p>See additional formatting, filtering, transformation, and calculation functions in the previous blog on <em><a title=\"CLF and ELF Web Log Data Processing\" href=\"http:\/\/www.iri.com\/blog\/data-transformation2\/clf-elf-web-log-data-processing\/\" target=\"_blank\" rel=\"noopener\">CLF and ELF Web Log Data Processing<\/a><\/em>. Contact <a href=\"mailto:fieldshield@iri.com\" target=\"_blank\" rel=\"noopener\">fieldshield@iri.com<\/a> for assistance.<br \/>\n<a name=\"docs-internal-guid-3d111805-1124-245f-8f36-6d34a4f4a277\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is third in a 3-part series on CLF and ELF web log data. We first introduced\u00a0CLF and ELF web log formats, then introduced\u00a0IRI solutions for processing web log data, and here we conclude by\u00a0masking private data in\u00a0web log\u00a0files.\u00a0Note\u00a0that this article specifically addresses the masking of structured web log files via IRI FieldShield, while<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\" title=\"How to Mask Data in Web Logs\">Read More<\/a><\/div>\n","protected":false},"author":53,"featured_media":11723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[673,676,14,674,203,677,205,520,148,149,22,518,678,675],"class_list":["post-5478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-clf","tag-clickstream","tag-data-masking","tag-elf","tag-encryption","tag-field-level-security","tag-hashing","tag-iri-fieldshield","tag-personally-identifiable-information","tag-pii","tag-pseudonymization","tag-randomize","tag-sub-string-manipulation","tag-web-log"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Mask Data in Web Logs - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Mask Data in Web Logs\" \/>\n<meta property=\"og:description\" content=\"This article is third in a 3-part series on CLF and ELF web log data. We first introduced\u00a0CLF and ELF web log formats, then introduced\u00a0IRI solutions for processing web log data, and here we conclude by\u00a0masking private data in\u00a0web log\u00a0files.\u00a0Note\u00a0that this article specifically addresses the masking of structured web log files via IRI FieldShield, whileRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-08T15:53:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T23:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"745\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chaitali Mitra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chaitali Mitra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\"},\"author\":{\"name\":\"Chaitali Mitra\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9bae14a309616863b027c2d56f532caf\"},\"headline\":\"How to Mask Data in Web Logs\",\"datePublished\":\"2014-07-08T15:53:26+00:00\",\"dateModified\":\"2019-12-30T23:26:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\"},\"wordCount\":409,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg\",\"keywords\":[\"CLF\",\"clickstream\",\"data masking\",\"ELF\",\"encryption\",\"field-level security\",\"hashing\",\"IRI FieldShield\",\"personally identifiable information\",\"PII\",\"pseudonymization\",\"randomize\",\"sub-string manipulation\",\"web log\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\",\"name\":\"How to Mask Data in Web Logs - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg\",\"datePublished\":\"2014-07-08T15:53:26+00:00\",\"dateModified\":\"2019-12-30T23:26:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg\",\"width\":1110,\"height\":745},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Mask Data in Web Logs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9bae14a309616863b027c2d56f532caf\",\"name\":\"Chaitali Mitra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/95a11f3d0b709c00df3262bab0152f3a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/95a11f3d0b709c00df3262bab0152f3a?s=96&d=blank&r=g\",\"caption\":\"Chaitali Mitra\"},\"sameAs\":[\"http:\/\/www.iri.com\"],\"url\":\"https:\/\/www.iri.com\/blog\/author\/chaitalim\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Mask Data in Web Logs - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/","og_locale":"en_US","og_type":"article","og_title":"How to Mask Data in Web Logs","og_description":"This article is third in a 3-part series on CLF and ELF web log data. We first introduced\u00a0CLF and ELF web log formats, then introduced\u00a0IRI solutions for processing web log data, and here we conclude by\u00a0masking private data in\u00a0web log\u00a0files.\u00a0Note\u00a0that this article specifically addresses the masking of structured web log files via IRI FieldShield, whileRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/","og_site_name":"IRI","article_published_time":"2014-07-08T15:53:26+00:00","article_modified_time":"2019-12-30T23:26:24+00:00","og_image":[{"width":1110,"height":745,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","type":"image\/jpeg"}],"author":"Chaitali Mitra","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chaitali Mitra","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/"},"author":{"name":"Chaitali Mitra","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9bae14a309616863b027c2d56f532caf"},"headline":"How to Mask Data in Web Logs","datePublished":"2014-07-08T15:53:26+00:00","dateModified":"2019-12-30T23:26:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/"},"wordCount":409,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","keywords":["CLF","clickstream","data masking","ELF","encryption","field-level security","hashing","IRI FieldShield","personally identifiable information","PII","pseudonymization","randomize","sub-string manipulation","web log"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/","name":"How to Mask Data in Web Logs - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","datePublished":"2014-07-08T15:53:26+00:00","dateModified":"2019-12-30T23:26:24+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","width":1110,"height":745},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/web-log-data-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Mask Data in Web Logs"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/9bae14a309616863b027c2d56f532caf","name":"Chaitali Mitra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/95a11f3d0b709c00df3262bab0152f3a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/95a11f3d0b709c00df3262bab0152f3a?s=96&d=blank&r=g","caption":"Chaitali Mitra"},"sameAs":["http:\/\/www.iri.com"],"url":"https:\/\/www.iri.com\/blog\/author\/chaitalim\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5478"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=5478"}],"version-history":[{"count":33,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5478\/revisions"}],"predecessor-version":[{"id":13409,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5478\/revisions\/13409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11723"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=5478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=5478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=5478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}