Log Potential Security Breach workflow

The result of the Log Potential Security Breach workflow is a Security Issue asset. It entails some preliminary information, such as the Technology assets that might have been affected by the potential breach. This information is recorded as attributes in the Security Issue asset.

Keep in mind that the Security Issue asset does not represent an actual data breach, but rather a potential data breach, which requires further investigation. Upon investigation, the possible conclusions are the following:

  • There was no breach.
  • There was a singular, stand-alone breach.
  • There was a breach that is part of a bigger breach.
Note Before starting this workflow, ensure that the Community Manager and Privacy Steward responsibilities have been created for the New Data Issues domain, to match the resource roles that appear in the Roles section of the workflow settings.


The New Data Issues domain:

  • Is the domain in which the Security Issue is created and stored.
  • Is located in the Data Governance Council community.
  • Is "hidden" in the community-domain browser, to avoid it being inadvertently deleted.

You can view all the assets in this domain via the Data Helpdesk. You can also find the domain by searching for it via the Search field.

Start the workflow

You can log a potential data breach via the Privacy dashboard or by clicking in the main menu.