A conversation with our CISO last quarter changed how I think about observability data entirely.
The Regulatory Wake-Up Call
“Michelle, do you know what’s in your telemetry data?”
I started listing technical signals - latency, error rates, request volumes. She stopped me.
“No. I mean, do you know whose session IDs are in your traces? Which IP addresses are in your logs? What user identifiers flow through your metrics labels?”
I didn’t. And that’s a problem.
Telemetry as Compliance Liability
In 2026, regulated industries are treating telemetry like they treat any other data store containing personal information:
What’s in your observability data?
- User IDs and session tokens
- IP addresses and geolocation
- Device fingerprints
- Email addresses in error messages
- Credit card numbers in debug logs
- Health information in API responses
Who can access it?
- Your observability vendor
- Your engineering team
- Your support team
- Anyone with dashboard access
How long do you keep it?
- Often longer than your formal data retention policies
- Sometimes indefinitely “for debugging”
The Regulatory Framework
GDPR Article 5: Personal data must be “adequate, relevant and limited to what is necessary.”
Your traces capturing full request bodies? Probably not necessary.
CCPA Right to Delete: Users can request deletion of personal information.
Can you delete a specific user’s data from your observability systems? Most organizations can’t.
HIPAA Minimum Necessary: Only the minimum necessary information should be used.
Those detailed logs from your healthcare application? Potential violation.
Privacy-by-Design Implementation
1. Data Classification at Collection
Before telemetry leaves your infrastructure:
processors:
attributes/pii:
actions:
- key: user.email
action: hash # One-way hash, preserves cardinality
- key: user.ip
action: redact # Replace with [REDACTED]
- key: http.request.body
action: delete # Remove entirely
- key: user.id
action: truncate # Keep first 4 chars only
2. Tiered Access Controls
| Role | Access Level |
|---|---|
| SRE On-Call | Aggregated metrics, sampled traces (anonymized) |
| Engineering | Service-level traces, hashed identifiers |
| Security | Full fidelity, audit logged |
| Compliance | Query-only, purpose-limited |
3. Retention with Teeth
- Hot tier (7 days): Full detail, fast queries
- Warm tier (30 days): Aggregated, anonymized
- Cold tier (1 year): Compliance minimum only
- Delete: Automated, audited
How Adaptive Telemetry Helps
This is where adaptive telemetry becomes a privacy tool, not just a cost tool:
- Reduce surface area - Less data collected means less data to protect
- Purpose-driven retention - Keep what you use, delete what you don’t
- Intelligent redaction - ML can identify and mask PII patterns
- Audit-ready logging - Track who accessed what and why
The Competitive Advantage
Organizations that get this right won’t just avoid fines - they’ll win enterprise deals. Privacy-by-design observability is becoming a procurement checkbox.
Is anyone else navigating this intersection of observability and privacy compliance? What frameworks are working for you?