ThemisDB provides a comprehensive suite of administrative tools designed to help database administrators, security officers, and compliance teams manage their ThemisDB deployments effectively. This document provides an overview of all admin tools with focus on privacy, security, and compliance features.
Status: ✅ Available
Detects, manages, and pseudonymizes Personally Identifiable Information (PII) in ThemisDB to ensure GDPR, CCPA, and other privacy regulation compliance.
Key Features:
- Pattern-based and ML-based PII detection
- Support for multiple PII types (email, SSN, credit cards, phone numbers, etc.)
- Custom rule configuration for organization-specific patterns
- Pseudonymization with consistent pseudonyms
- Data masking and redaction
- Compliance reporting and audit logs
Use Cases:
- Pre-production PII scanning before data ingestion
- Regular compliance audits
- Data subject access requests (DSAR)
- Right to be forgotten (RTBF) implementation
Documentation: pii-manager.md
Status: 🚧 Under Development
Manages encryption keys and automates key rotation procedures to maintain security best practices.
Key Features:
- Centralized key management interface
- Automated key rotation scheduling
- Key versioning and lifecycle management
- Zero-downtime key rotation
- Compliance with key management standards (NIST, FIPS)
- Audit trail for all key operations
- Integration with HSM (Hardware Security Modules)
Planned Capabilities:
-
Encryption Key Types:
- Data-at-rest encryption keys (AES-256)
- Transport encryption keys (TLS certificates)
- Field-level encryption keys
- Vector embedding encryption keys
-
Rotation Strategies:
- Scheduled rotation (daily, weekly, monthly)
- On-demand rotation
- Emergency rotation for compromised keys
- Graceful key deprecation
-
Key Storage Options:
- Local secure storage
- Cloud KMS (AWS KMS, Azure Key Vault, Google Cloud KMS)
- HashiCorp Vault
- Hardware Security Modules (HSM)
Use Cases:
- Regular key rotation for compliance (PCI-DSS, HIPAA)
- Emergency key rotation after security incidents
- Certificate renewal and management
- Key lifecycle audit and reporting
Documentation: key-rotation-dashboard.md
Status: 🚧 Under Development
Generates comprehensive compliance reports for various regulatory frameworks and standards.
Key Features:
- Pre-built report templates for major regulations
- Customizable report formats and content
- Automated report generation and scheduling
- Evidence collection and documentation
- Export to multiple formats (PDF, CSV, JSON, Excel)
- Digital signing and timestamping
Supported Frameworks:
-
GDPR (General Data Protection Regulation)
- Data processing activities
- Consent management
- Data subject rights (access, deletion, portability)
- Data breach notifications
-
eIDAS (Electronic Identification and Trust Services)
- Electronic signatures
- Timestamp services
- Qualified trust service providers
-
HIPAA (Health Insurance Portability and Accountability Act)
- PHI access logs
- Encryption compliance
- Audit controls
-
PCI-DSS (Payment Card Industry Data Security Standard)
- Cardholder data environment
- Key management
- Access controls
-
SOC 2 (Service Organization Control 2)
- Security controls
- Availability monitoring
- Processing integrity
-
ISO 27001 (Information Security Management)
- Risk assessments
- Security controls
- Incident response
Report Types:
- Audit Reports: Complete audit trails with timestamps
- Access Reports: User access patterns and permissions
- Data Inventory: Classification and location of sensitive data
- Retention Reports: Data retention policy compliance
- Incident Reports: Security and privacy incidents
- Assessment Reports: Risk assessments and gap analysis
Use Cases:
- Regulatory compliance audits
- Internal security assessments
- Customer compliance documentation
- Continuous compliance monitoring
Documentation: compliance-reports.md
Status: ✅ Documented (see TOOLS_INDEX.md)
Configure and manage data classification rules to automatically categorize sensitive data.
Documentation: Referenced in TOOLS_INDEX.md
Status: ✅ Documented (see TOOLS_INDEX.md)
Configure and monitor data retention policies to ensure compliance with legal and business requirements.
Documentation: Referenced in TOOLS_INDEX.md
Status: ✅ Available
Visual query builder for AQL (Advanced Query Language) with syntax highlighting and query optimization.
Documentation: aql-query-builder.md
Status: ✅ Available
Browse, filter, and export audit logs for security analysis and compliance.
Documentation: audit-log-viewer.md
Status: ✅ Documented (see TOOLS_INDEX.md)
Visualize and query geospatial data stored in ThemisDB.
Documentation: Referenced in TOOLS_INDEX.md
Status: ✅ Documented (see TOOLS_INDEX.md)
Analyze query performance and resource impact.
Documentation: Referenced in TOOLS_INDEX.md
Status: ✅ Documented (see TOOLS_INDEX.md)
Verify and debug SAGA distributed transactions.
Documentation: Referenced in TOOLS_INDEX.md
All admin tools share a common architecture:
- Framework: .NET 8.0+
- UI: Avalonia (cross-platform) or WPF (Windows)
- API Client: Shared library (Themis.AdminTools.Shared)
- Authentication: JWT Bearer tokens
- Data Format: JSON over REST API
Themis.AdminTools.Shared/
├── ApiClient/ # REST API client
├── Models/ # Data models
├── Services/ # Shared business logic
├── Extensions/ # Utility extensions
└── Configuration/ # Configuration management
Documentation: admin-tools-shared.md
- .NET 8.0 SDK or later
- Access to running ThemisDB server
- Valid authentication credentials
- Appropriate permissions for admin operations
# Clone repository
git clone https://github.com/makr-code/ThemisDB.git
cd ThemisDB/tools
# Restore dependencies
dotnet restore
# Build all admin tools
dotnet build
# Run a specific tool (example: PII Manager)
cd Themis.PIIManager
dotnet runEach tool uses an appsettings.json configuration file:
{
"ThemisDB": {
"BaseUrl": "http://localhost:8080",
"BearerToken": "your-jwt-token-here",
"Timeout": 30
},
"Logging": {
"LogLevel": {
"Default": "Information"
}
}
}When using admin tools:
-
Authentication
- Always use strong authentication tokens
- Rotate tokens regularly
- Never commit tokens to version control
-
Network Security
- Use TLS/HTTPS for all connections
- Consider VPN for remote access
- Implement IP whitelisting where possible
-
Access Control
- Apply principle of least privilege
- Use role-based access control (RBAC)
- Audit all admin actions
-
Data Protection
- Encrypt sensitive data at rest and in transit
- Use secure key storage (HSM, cloud KMS)
- Implement data masking for display
-
Audit & Compliance
- Enable comprehensive audit logging
- Regular compliance reviews
- Document all administrative actions
- Data Discovery: Use PII Manager to scan for personal data
- Data Classification: Apply classification rules with Classification Dashboard
- Retention Policies: Configure with Retention Manager
- Access Auditing: Review with Audit Log Viewer
- Compliance Reporting: Generate reports with Compliance Reports tool
- Key Management: Ensure encryption with Key Rotation Dashboard
- PHI Identification: Scan with PII Manager for health information
- Encryption: Manage keys with Key Rotation Dashboard
- Access Controls: Monitor with Audit Log Viewer
- Audit Trails: Generate with Compliance Reports
- Risk Assessments: Perform with Impact Analysis Viewer
- Cardholder Data: Detect with PII Manager
- Encryption Keys: Rotate with Key Rotation Dashboard
- Access Logs: Review with Audit Log Viewer
- Compliance Reports: Generate quarterly reports
- Network Security: Monitor with administrative tools
- Key Rotation Dashboard: Complete implementation with HSM support
- Compliance Reports: Add support for additional frameworks
- Enhanced PII Detection: ML model improvements
- Integration APIs: Programmatic access to admin functions
- Mobile Apps: iOS and Android admin tools
- Cloud Integrations: Native support for AWS, Azure, GCP
- Blockchain Integration: Immutable audit trails
- AI-Powered Anomaly Detection: Automated threat detection
- Real-time Compliance Monitoring: Continuous compliance dashboards
- Multi-tenancy Support: Isolated admin environments
- Documentation: ThemisDB Docs
- Tool Index: TOOLS_INDEX.md
- GitHub Issues: Report Problems
- Community: Discussions
We welcome contributions to admin tools:
- Follow the existing architecture and patterns
- Ensure cross-platform compatibility
- Include comprehensive tests
- Document new features
- Follow security best practices
See CONTRIBUTING.md for details.
Apache 2.0 - See LICENSE for details.