Story Anonymization User - COS301-SE-2025/CRISP GitHub Wiki

CRISP Anonymization Component - User Stories

Secure Threat Intelligence Sharing Through Data Anonymization

As a cybersecurity professional working in threat intelligence sharing
I want to control how much sensitive information is revealed when sharing threat data
So that I can collaborate with other organizations while protecting sensitive operational details.


User Story 1: Admin Configures Global Anonymization Policies

As a Administrator (Admin)
I want to configure global anonymization policies for the platform
So that I can ensure consistent data protection standards across all organizations.

  • I can access the anonymization configuration panel in the admin interface
  • I can set default anonymization levels for different data types (IP addresses, domains, emails, URLs)
  • I can configure trust level mappings (high trust = low anonymization, low trust = high anonymization)
  • I can define industry-specific anonymization rules
  • I can set maximum data retention periods for anonymized data
  • Changes to global policies are logged for audit purposes
  • I can preview how anonymization will affect sample data before applying changes

User Story 2: Publisher Controls Data Sharing Levels

As a Publisher
I want to control the anonymization level when sharing my organization's threat data
So that I can balance information sharing with operational security needs.

  • I can set anonymization levels when creating a new threat feed
  • I can specify different anonymization levels for different subscriber organizations
  • I can preview how my data will appear to different trust levels before publishing
  • I can modify anonymization settings for existing feeds I own
  • I receive warnings when sharing data that might be too revealing
  • I can see statistics on how much data is being anonymized vs. shared raw

User Story 3: Viewer Understands Data Anonymization Status

As a e Viewer
I want to understand when and how threat data has been anonymized
So that I can properly interpret the intelligence and assess its reliability.

  • I can see anonymization indicators on threat intelligence data
  • I understand what anonymization level was applied (e.g., "192.168.x.x" indicates medium IP anonymization)
  • I can view metadata about the original data source and anonymization applied
  • I can filter threat feeds based on anonymization levels
  • I receive explanations of what different anonymization patterns mean
  • I can request higher trust levels to access less anonymized data

User Story 4: Publisher Manages Trust-Based Data Sharing

As a Publisher
I want to share different levels of detail with different organizations based on trust relationships
So that I can provide more detailed information to trusted partners while still contributing to community defense.

  • I can define trust levels for different subscriber organizations
  • High-trust partners receive less anonymized data (e.g., full IP addresses)
  • Medium-trust partners receive moderately anonymized data (e.g., "192.168.x.x")
  • Low-trust or public feeds receive highly anonymized data (e.g., "*.commercial")
  • I can bulk update trust levels for multiple organizations
  • Changes to trust levels apply to future data shares immediately
  • I can see which organizations are receiving which anonymization levels

User Story 5: Admin Monitors Anonymization System Health

As a Administrator
I want to monitor the anonymization system's performance and accuracy
So that I can ensure data is being properly protected and the system is functioning correctly.

  • I can view anonymization processing statistics (items processed, success rate)
  • I can monitor system performance metrics (processing time, memory usage)
  • I receive alerts when anonymization failures occur
  • I can run validation checks to ensure anonymization consistency
  • I can view anonymization audit logs showing what was anonymized when
  • I can generate compliance reports showing data protection measures

User Story 6: Viewer Searches Anonymized Threat Data

As a Viewer
I want to search for threat indicators even when they've been anonymized
So that I can find relevant threats that might affect my organization.

  • I can search for anonymized patterns (e.g., "192.168.x.x" finds all indicators in that range)
  • Search results show anonymization level applied to each result
  • I can filter search results by anonymization level
  • I can search for threat indicators by industry category when domains are highly anonymized
  • Search suggestions help me understand what anonymized patterns to look for
  • I can save searches for anonymized patterns I'm interested in

User Story 7: Publisher Reviews Anonymization Before Publishing

As a Publisher
I want to review exactly how my threat data will appear after anonymization
So that I can ensure the right balance of sharing and security before publishing.

  • I can preview anonymized data before publishing a threat feed
  • Preview shows data as it will appear to different trust levels
  • I can compare original data side-by-side with anonymized versions
  • I can modify anonymization settings and see updated previews immediately
  • I can identify when anonymization might make data less useful
  • I can export anonymized previews for review by my security team

User Story 8: Admin Manages Anonymization Strategies

As a Administrator
I want to configure and update anonymization strategies for different data types
So that I can maintain effective data protection as threats and sharing needs evolve.

  • I can configure anonymization rules for IP addresses, domains, emails, and URLs
  • I can add new anonymization strategies for emerging data types
  • I can test anonymization strategies with sample data before deployment
  • I can schedule gradual rollouts of new anonymization strategies
  • I can revert to previous anonymization strategies if needed
  • Changes to strategies are logged and can be audited