• /
  • EnglishEspañolFrançais日本語한국어Português
  • Inicia sesiónComenzar ahora

Data access control

Controlling who accesses specific data within your organization is vital for security, compliance, and data governance. While New Relic's role-based access control manages what features users can access, data access control manages what specific data users can view.

Currently, data access control is available for log data, allowing you to restrict user access to specific log partitions.

How it works

Large organizations generate massive amounts of logs across various teams, services, and environments. Security teams need to monitor critical security logs that may contain personally identifiable information (PII), while development teams only need to see logs relevant to their specific microservices. Data access control lets you create policies that define exactly which log partitions each team can access.

You create data access policies that restrict access to specific log partitions and assign them to user groups via access grants. Users in groups with assigned policies can only access the log partitions allowed by those policies.

We recommend starting with a deny-all approach and then adding allow policies to grant access only to necessary partitions. This follows the principle of least privilege and ensures users only access data they need.

Key concepts:

  • Data access policies: Define which log partitions users can access using allow-lists or deny-lists.
  • Policy assignment: Policies are assigned to groups via the *Access Management** UI.
  • Wildcard matching: Use % as a wildcard to match multiple partitions (e.g., log_prod% matches all partitions starting with "log_prod").
  • Multiple policies: When users belong to multiple groups with different policies, the most permissive access applies.

Importante

Users with restricted access might still see information from restricted log partitions through historical exports, alert notifications, or the Insights API. See potential data exposure risks for details and mitigations.

Requirements

To create and manage data access policies, you must have:

Create and assign data access policies

You can create and assign data access policies through the UI or the NerdGraph API. To create a policy through the UI, refer to the following steps:

Create a policy

  1. Go to one.newrelic.com > Administration > Access Management > Data access policies.
  2. Click Create a policy (or Add a policy if you have existing policies).
Screenshot showing how to add a data access policy
  1. Enter a name for the policy.
  2. Select a condition:
    • Deny selected: Blocks access to selected log partitions.
    • Allow selected: Allows access only to selected log partitions.
  3. From the Filter partitions by account dropdown, select accounts to shortlist the log partition list.
  4. Select log partitions to include in the policy:
    • Choose partitions from the dropdown, or
    • Type partition names or wildcards (e.g., log_go% to match multiple partitions), separated by commas.
  5. Click Review policy to verify your configuration.
  6. Click Create policy.

The policy appears in the Data access policies tab. To view, edit, or delete it, click the menu.

Assign the policy to a group

  1. Go to Administration > Access Management > Grants.
  2. Find the grant to assign the policy, then click the menu next to it.
  3. Select Add data access policy.
  4. From the Policies dropdown, select your policy.
  5. Click Save.

The Policy name column shows the assigned policy. To remove or change it, use the menu.

Multiple policies and access resolution

When users belong to multiple groups with different data access policies:

  • Allow policies combine: Users gain access to all partitions allowed across their groups. For example, if Group A allows log_frontend% and Group B allows log_backend%, users access both.
  • Deny policies override: Any deny policy overrides allow policies. For example, if Group A allows log_% but Group B denies log_sensitive, users access all partitions except log_sensitive.

To view which policies apply to a user, go to Administration > Access Management > Grants and check the Policy name column for their groups.

Potential data exposure risks

While data access control restricts log data access in most New Relic features, there are scenarios where users might still see restricted data:

User management concepts

Learn about user types, roles, and user management capabilities.

Manage users with NerdGraph

Use the NerdGraph API to programmatically manage users and access grants.

Log partitions

Understand how to organize your log data into partitions for better control and performance.

Manage data access policies via NerdGraph

Learn to create and manage data access policies using the NerdGraph API.

Copyright © 2025 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.