Skip to content

Commit e589258

Browse files
Documentation edits made through Mintlify web editor
1 parent 3671dd8 commit e589258

31 files changed

+256
-66
lines changed

docs.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,8 +111,7 @@
111111
"group": "Web Applications",
112112
"pages": [
113113
"quickstart/web-applications/webapps-and-apis",
114-
"quickstart/web-applications/http-proxy",
115-
"quickstart/web-applications/jump-hosts"
114+
"quickstart/web-applications/http-proxy"
116115
]
117116
},
118117
{
@@ -210,7 +209,8 @@
210209
"integrations/teams",
211210
"integrations/jira",
212211
"integrations/svix",
213-
"integrations/aws"
212+
"integrations/aws",
213+
"integrations/ms-presidio"
214214
]
215215
}
216216
]

integrations/ms-presidio.mdx

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: "Microsoft Presidio"
3+
description: "Enable sensitive data detection, masking, and guardrail enforcement using Microsoft Presidio."
4+
---
5+
6+
Hoop.dev’s Microsoft Presidio integration provides a powerful framework for detecting, classifying, and masking sensitive data within infrastructure sessions and workflows. It strengthens security and compliance by enforcing guardrails and protecting personally identifiable information (PII) across your organization’s resources.
7+
8+
## Key Features
9+
10+
### AI Data Masking
11+
12+
- Automatically identify and mask sensitive information such as PII and secrets within session logs or command inputs
13+
- Ensure compliance with data protection policies while maintaining operational visibility
14+
- Apply consistent masking across multiple environments and data flows
15+
16+
### Guardrails and Policy Enforcement
17+
18+
- Create and enforce custom guardrails that restrict sensitive actions or access patterns
19+
- Prevent risky operations by applying rule-based controls to session activity
20+
- Integrate seamlessly with approval workflows and policy evaluation mechanisms
21+
22+
### Extensible Detection
23+
24+
- Utilize Microsoft Presidio’s analyzers and recognizers to detect sensitive entities
25+
- Extend detection logic with custom patterns to meet specific organizational requirements
26+
- Benefit from Presidio’s open-source flexibility and ongoing improvements
27+
28+
## Benefits
29+
30+
- **Security:** Protect sensitive data in real time through automated masking and rule enforcement
31+
- **Compliance:** Simplify adherence to privacy and governance standards by integrating PII protection directly into access flows
32+
- **Control:** Define fine-grained policies for data handling and operational boundaries
33+
- **Transparency:** Maintain a complete audit trail of masking and enforcement actions
34+
35+
## Integration with Other Features
36+
37+
Microsoft Presidio works seamlessly with other Hoop.dev capabilities:
38+
39+
- **Sessions:** Mask sensitive data in session recordings and live streams
40+
- **Guardrails:** Apply Presidio-powered rules to restrict or log sensitive operations
41+
- **Approvals:** Automatically trigger approvals or alerts when guardrail conditions are met
42+
- **Logging & Monitoring:** Ensure all sensitive data is masked before being stored or transmitted
43+
44+
## Configuration
45+
46+
<Steps>
47+
<Step title="Install">
48+
Check the Microsoft Presidio documentation to install it.
49+
50+
<CardGroup cols={2}>
51+
<Card title="Microsoft Presidio Docker Installation" icon="microsoft" href="https://microsoft.github.io/presidio/installation/#docker-installation">
52+
Visit the Microsoft Presidio documentation to install it using Docker.
53+
</Card>
54+
<Card title="Microsoft Presidio Kubernetes Installation" icon="microsoft" href="https://microsoft.github.io/presidio/samples/deployments/k8s/">
55+
Visit the Microsoft Presidio documentation to install it using Kubernetes.
56+
</Card>
57+
</CardGroup>
58+
</Step>
59+
<Step title="Set up">
60+
Set the new environment variables in hoop.dev's Gateway with the following values:
61+
62+
| Environment variable key | Value |
63+
| --------------------------- | --------------------------- |
64+
| `DLP_PROVIDER` | mspresidio |
65+
| `DLP_MODE` | `best-effort` or `strict` |
66+
| `MSPRESIDIO_ANALYZER_URL` | `<host-to-analyzer:port>` |
67+
| `MSPRESIDIO_ANONYMIZER_URL` | `<host-to-anonymizer:port>` |
68+
</Step>
69+
<Step title="Run hoop.dev's Gateway with the new configs">
70+
After setting up the environment variables, hoop.dev will use Microsoft Presidio to mask sensitive data in real-time in the data stream of any connection you configure.
71+
</Step>
72+
</Steps>

setup/configuration/ai-data-masking/get-started.mdx

Lines changed: 46 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -4,76 +4,73 @@ description: "Set up and know better about hoop.dev's AI Data Masking"
44
---
55

66
<Frame>
7-
<img
8-
src="/images/ai-data-masking.png"
9-
/>
7+
![](/images/ai-data-masking.png)
108
</Frame>
119

1210
## Prerequisites
1311

14-
- Have properly installed hoop.dev through one of the options available in the [deployment overview](/setup/deployment/overview)
15-
- Be on an enterprise plan
16-
- Enough access to your infrastructure so you can load environment variables to your hoop.dev instance
17-
- Have admin access to your hoop.dev instance
12+
- Have properly installed hoop.dev through one of the options available in the [deployment overview](/setup/deployment/overview)
13+
- Be on an enterprise plan
14+
- Enough access to your infrastructure so you can load environment variables to your hoop.dev instance
15+
- Have admin access to your hoop.dev instance
1816

1917
<Note>
2018
This page is dedicated to the setup of AI Data Masking in self-hosted instances. If you are looking for the Learn Guides of AI Data Masking, [click here](/learn/ai-data-masking).
2119
</Note>
2220

23-
## Set up
21+
## Setup
2422

25-
You can either use Google Cloud Data Loss Prevention hosted by Google on GCP, or Microsoft Presidio, an open-source project that you can host yourself.
23+
This service currently supports Microsoft Presidio for data classification and PII detection.
2624

27-
### Google Cloud Data Loss Prevention (DLP)
25+
Google Cloud Data Loss Prevention (DLP) is still available for existing customers but is deprecated for new installations.
2826

2927
<Info>
3028
You must be on an enterprise plan to have access to the AI Data Masking feature.
3129
</Info>
3230

33-
Create an account at [Google Cloud Data Loss Prevention](https://cloud.google.com/security/products/dlp) and a service account with the permission `roles/dlp.user`.
34-
35-
When installing hoop.dev, you need to set the environment variable `GOOGLE_APPLICATION_CREDENTIALS_JSON` with your GCP DLP credentials in hoop's Gateway.
36-
Hoop.dev uses Google Cloud's DLP at our protocol layer to mask sensitive data in real-time in the data stream of any connection you configure.
37-
3831
### Microsoft Presidio
3932

4033
<Steps>
41-
<Step title="Install">
42-
Check the Microsoft Presidio documentation to install it.
43-
<CardGroup cols={2}>
44-
<Card
45-
title="Microsoft Presidio Docker Installation"
46-
icon="microsoft"
47-
href="https://microsoft.github.io/presidio/installation/#docker-installation">
48-
Visit the Microsoft Presidio documentation to install it using Docker.
49-
</Card>
50-
<Card
51-
title="Microsoft Presidio Kubernetes Installation"
52-
icon="microsoft"
53-
href="https://microsoft.github.io/presidio/samples/deployments/k8s/">
54-
Visit the Microsoft Presidio documentation to install it using Kubernetes.
55-
</Card>
56-
</CardGroup>
57-
</Step>
58-
<Step title="Set up">
59-
Set the new environment variables in hoop.dev's Gateway with the following values:
60-
| Environment variable key | Value |
61-
| --------------------------- | ----- |
62-
| `DLP_PROVIDER` | mspresidio |
63-
| `DLP_MODE` | `best-effort` or `strict` |
64-
| `MSPRESIDIO_ANALYZER_URL` | `<host-to-analyzer:port>` |
65-
| `MSPRESIDIO_ANONYMIZER_URL` | `<host-to-anonymizer:port>` |
66-
</Step>
67-
<Step title="Run hoop.dev's Gateway with the new configs">
68-
After setting up the environment variables, hoop.dev will use Microsoft Presidio to mask sensitive data in real-time in the data stream of any connection you configure.
69-
</Step>
34+
<Step title="Install">
35+
Check the Microsoft Presidio documentation to install it.
36+
37+
<CardGroup cols={2}>
38+
<Card title="Microsoft Presidio Docker Installation" icon="microsoft" href="https://microsoft.github.io/presidio/installation/#docker-installation">
39+
Visit the Microsoft Presidio documentation to install it using Docker.
40+
</Card>
41+
<Card title="Microsoft Presidio Kubernetes Installation" icon="microsoft" href="https://microsoft.github.io/presidio/samples/deployments/k8s/">
42+
Visit the Microsoft Presidio documentation to install it using Kubernetes.
43+
</Card>
44+
</CardGroup>
45+
</Step>
46+
<Step title="Set up">
47+
Set the new environment variables in hoop.dev's Gateway with the following values:
48+
49+
| Environment variable key | Value |
50+
| --------------------------- | --------------------------- |
51+
| `DLP_PROVIDER` | mspresidio |
52+
| `DLP_MODE` | `best-effort` or `strict` |
53+
| `MSPRESIDIO_ANALYZER_URL` | `<host-to-analyzer:port>` |
54+
| `MSPRESIDIO_ANONYMIZER_URL` | `<host-to-anonymizer:port>` |
55+
</Step>
56+
<Step title="Run hoop.dev's Gateway with the new configs">
57+
After setting up the environment variables, hoop.dev will use Microsoft Presidio to mask sensitive data in real-time in the data stream of any connection you configure.
58+
</Step>
7059
</Steps>
7160

61+
### Google Cloud Data Loss Prevention (DLP)
62+
63+
Create an account at [Google Cloud Data Loss Prevention](https://cloud.google.com/security/products/dlp) and a service account with the permission `roles/dlp.user`.
64+
65+
When installing hoop.dev, you need to set the environment variable `GOOGLE_APPLICATION_CREDENTIALS_JSON` with your GCP DLP credentials in hoop's Gateway. Hoop.dev uses Google Cloud's DLP at our protocol layer to mask sensitive data in real-time in the data stream of any connection you configure.
66+
67+
<Note>
68+
Google Cloud Data Loss Prevention (DLP) is still available for existing customers but is deprecated for new installations.
69+
</Note>
7270

7371
## Redact Modes
7472

75-
The gateway now supports two operational modes that control how redaction failures are handled.
76-
Configure your preferred mode by setting the environment variable **DLP_MODE** to either `strict` or `best-effort`.
73+
The gateway now supports two operational modes that control how redaction failures are handled. Configure your preferred mode by setting the environment variable **DLP_MODE** to either `strict` or `best-effort`.
7774

7875
### best-effort
7976

@@ -89,15 +86,14 @@ This mode will return an error in case it find any redaction issue
8986

9087
## Activate to your connections
9188

92-
Navigate to your Web App instance > Open the Manage toggle > click at AI Data Masking > Activate by connection and to configure which fields you want to set, hit the "Configure" button.
89+
Navigate to your Web App instance \> Open the Manage toggle \> click at AI Data Masking \> Activate by connection and to configure which fields you want to set, hit the "Configure" button.
9390

9491
<Frame>
95-
<img src="/images/configure/ai-data-masking-activate-connection.png" />
92+
![](/images/configure/ai-data-masking-activate-connection.png)
9693
</Frame>
9794

9895
## How it works
9996

10097
At the protocol layer when communicating with a database or server, hoop.dev will open the package and communicate with DLP provider to mask sensitive data in it. This happens in memory and in real-time, so the data is never stored in the database or server in its original form.
10198

102-
After the setup, we automatically give you a bunch of default and most used fields, so you don't need to worry much about that part either. You can remove or add fields as much as you like. To see all fields available, check our [documentation page for all fields supported](/setup/configuration/ai-data-masking/fields).
103-
99+
After the setup, we automatically give you a bunch of default and most used fields, so you don't need to worry much about that part either. You can remove or add fields as much as you like. To see all fields available, check our [documentation page for all fields supported](/setup/configuration/ai-data-masking/fields).

setup/configuration/guardrails-configuration.mdx

Lines changed: 50 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,31 +4,69 @@ description: "Create and manage custom rules to protect and guide usage within y
44
---
55

66
<Frame>
7-
<img src="/images/clients/webapp/guardrails-light.png" className="block dark:hidden" />
8-
<img src="/images/clients/webapp/guardrails-dark.png" className="hidden dark:block" />
7+
<img
8+
src="/images/clients/webapp/guardrails-light.png"
9+
className="block dark:hidden"
10+
/>
11+
12+
<img
13+
src="/images/clients/webapp/guardrails-dark.png"
14+
className="hidden dark:block"
15+
/>
916
</Frame>
1017

1118
Guardrails allow you to create custom rules that protect and guide how your connections are used. These rules can be applied to specific connections or serve as default policies across your organization.
1219

20+
## Setup
21+
22+
This service currently supports Microsoft Presidio for configuring Guardrails rules.
23+
24+
<Steps>
25+
<Step title="Install">
26+
Check the Microsoft Presidio documentation to install it.
27+
28+
<CardGroup cols={2}>
29+
<Card title="Microsoft Presidio Docker Installation" icon="microsoft" href="https://microsoft.github.io/presidio/installation/#docker-installation">
30+
Visit the Microsoft Presidio documentation to install it using Docker.
31+
</Card>
32+
<Card title="Microsoft Presidio Kubernetes Installation" icon="microsoft" href="https://microsoft.github.io/presidio/samples/deployments/k8s/">
33+
Visit the Microsoft Presidio documentation to install it using Kubernetes.
34+
</Card>
35+
</CardGroup>
36+
</Step>
37+
<Step title="Set up">
38+
Set the new environment variables in hoop.dev's Gateway with the following values:
39+
40+
| Environment variable key | Value |
41+
| :-------------------------- | :-------------------------- |
42+
| `DLP_PROVIDER` | mspresidio |
43+
| `DLP_MODE` | `best-effort` or `strict` |
44+
| `MSPRESIDIO_ANALYZER_URL` | `<host-to-analyzer:port>` |
45+
| `MSPRESIDIO_ANONYMIZER_URL` | `<host-to-anonymizer:port>` |
46+
</Step>
47+
<Step title="Run hoop.dev's Gateway with the new configs">
48+
After setting up the environment variables, hoop.dev will use Microsoft Presidio to create a secure layer with custom rules that protect and guide how your resources are used.
49+
</Step>
50+
</Steps>
51+
1352
## Creating a Guardrail
1453

1554
<Steps>
1655
<Step title="Access Guardrails">
1756
Navigate to the Guardrails section from the sidebar menu
1857
</Step>
19-
2058
<Step title="Create New">
2159
Click the "Create a new Guardrail" button in the top-right corner
2260
</Step>
23-
2461
<Step title="Set Basic Information">
2562
Provide:
63+
2664
- Name for the guardrail
2765
- Description (Optional) explaining its purpose
2866
</Step>
29-
3067
<Step title="Configure Rules">
3168
Provide:
69+
3270
- Input Rules
3371
- Output Rules
3472
</Step>
@@ -37,12 +75,14 @@ Guardrails allow you to create custom rules that protect and guide how your conn
3775
## Configuring Rules
3876

3977
### Input Rules
78+
4079
Rules that evaluate incoming commands or queries:
4180

4281
- **Pattern Matching**: Define patterns to match specific commands or queries
4382
- **Conditions**: Set conditions that trigger the rule
4483

4584
### Output Rules
85+
4686
Rules that control or modify the output of commands:
4787

4888
- **Information Control**: Control what information can be returned
@@ -52,20 +92,21 @@ Rules that control or modify the output of commands:
5292
<AccordionGroup>
5393
<Accordion title="Pattern Rules">
5494
Create rules based on command or query patterns:
95+
5596
- Regular expressions
5697
- Exact matches
5798
- Wildcard patterns
5899
</Accordion>
59-
60100
<Accordion title="Security Rules">
61101
Enforce security policies:
102+
62103
- Block dangerous commands
63104
- Require additional approvals
64105
- Limit access to sensitive data
65106
</Accordion>
66-
67107
<Accordion title="Compliance Rules">
68108
Ensure compliance requirements:
109+
69110
- Data access restrictions
70111
- Audit logging requirements
71112
- Regulatory compliance rules
@@ -75,17 +116,17 @@ Rules that control or modify the output of commands:
75116
## Applying Guardrails
76117

77118
### Connection Assignment
119+
78120
<Steps>
79121
<Step title="Select Connections">
80122
Choose which connections will use the guardrail
81123
</Step>
82-
83124
<Step title="Set Priority">
84125
Define the order of rule evaluation when multiple guardrails apply
85126
</Step>
86-
87127
<Step title="Configure Behavior">
88128
Specify how rules should be enforced:
129+
89130
- Block non-compliant actions
90131
- Warn users
91132
- Require approval
@@ -98,15 +139,12 @@ Rules that control or modify the output of commands:
98139
<Card title="Start Simple" icon="list-check">
99140
Begin with basic rules and expand as needed
100141
</Card>
101-
102142
<Card title="Test Rules" icon="vial">
103143
Validate rules in a test environment first
104144
</Card>
105-
106145
<Card title="Document Purpose" icon="file-lines">
107146
Clearly describe what each rule does
108147
</Card>
109-
110148
<Card title="Regular Review" icon="rotate">
111149
Periodically review and update rules
112150
</Card>
@@ -134,7 +172,6 @@ Keep your guardrails effective and current:
134172
<Card title="Managing Access" icon="users" href="/clients/webapp/managing-access">
135173
Learn about access control configuration
136174
</Card>
137-
138175
<Card title="Command Reviews" icon="shield-check" href="/setup/configuration/reviews/command-reviews-configuration">
139176
Configure command review workflows
140177
</Card>

0 commit comments

Comments
 (0)