Security Best Practices
The PII Leak That Never Happened
{
"traceId": "abc123...",
"spans": [{
"attributes": {
"user.email": "[email protected]",
"user.ssn": "123-45-6789",
"credit_card.number": "4532-1234-5678-9010",
"user.password": "MyP@ssw0rd!"
}
}]
}Rule #1: Never Log Sensitive Data
What Counts as Sensitive?
Automatic Redaction
Result
Sanitizing HTTP Headers
Collector-Level Sanitization
Securing Exporter Endpoints
TLS for Data in Transit
Authentication
Access Control for Telemetry Data
Jaeger RBAC
Data Retention and Deletion
Jaeger Retention Policies
Automated Data Deletion
Compliance Considerations
GDPR Right to Deletion
SOC 2 Audit Trail
Environment-Specific Sanitization
Security Checklist
Real Security Incident
What's Next
Last updated