Data provided to third parties
KUMA functionality does not involve automatic provision of user data to third parties.
Locally processed data
Kaspersky Unified Monitoring and Analysis Platform (hereinafter KUMA or "program") is an integrated software solution that includes the following primary functions:
To perform its primary functions, KUMA may receive, store and process the following information:
The KUMA Core server receives data if the corresponding integration is configured. You can add assets to KUMA in the following ways:
KUMA stores the following device information:
The KUMA Core server receives this information if the corresponding integration is configured. To ensure the security of the connection to the LDAP server, the user must enter the server URL, connection credentials, and certificate in the KUMA console.
In the collector, the event source is configured, KUMA events are generated and sent to other KUMA services. Sometimes events can arrive first at the agent service, which relays events from the source to the collector.
It can include certificates, tokens, URLs or credentials for establishing a connection with the other application, or other data necessary for the basic functionality of KUMA, for example, email. The user enters this data in the KUMA console
It can include the source name, host name, IP address, the monitoring policy assigned to the source. The monitoring policy specifies the email address of the person responsible, to whom a notification will be sent if the policy is violated.
The user enters this data in the KUMA interface.
The user specifies these settings in the corresponding sections of the KUMA console.
KUMA automatically records audit events.
The user can enable extended logging in the KUMA console. Log entries are stored on the user's device, no data is transmitted automatically.
The information listed above can find its way into KUMA in the following ways:
The listed information is stored in the KUMA database (MongoDB, ClickHouse). Passwords are stored in an encrypted form (the hash of the password is stored).
All of the information listed above can be transmitted to Kaspersky only in dump files, trace files, or log files of KUMA components, including log files created by the installer and utilities.
Dump files, trace files, and log files of KUMA components may contain personal and confidential information. Dump files, trace files, and log files are stored on the device in unencrypted form. Dump files, trace files, and log files are not automatically submitted to Kaspersky, but the administrator can manually submit this information to Kaspersky at the request of Technical Support to help troubleshoot KUMA problems.
Kaspersky uses the collected data in anonymized form and only for general statistical purposes. Summary statistics is generated from the received raw data automatically and does not contain any personal or other confidential information. When new data accumulates, older data is erased (once a year). Summary statistics is stored indefinitely.
Kaspersky protects all received data in accordance with applicable law and Kaspersky policies. Data is transmitted over secure communication channels.
Page top