Data Security & Privacy
Masking, Hashing & Encryption in real-time at scale
Last updated
Was this helpful?
Masking, Hashing & Encryption in real-time at scale
Last updated
Was this helpful?
Use the Data Security Rules screen to defined the rules at various levels as shown below. These rules will be applied on incoming data as a very first step and hence the data stays secured in all stages of the pipeline.
Rule
Example Outcome
Clear
Encrypt_AES
1P204LE2cf5b8utiiiSFPQ==
Hash_MD2
3073ab56bd093705ebcaa59b70b55f5c
Hash_MD5
6bad7e8404558aafa56e9b15195bba76
Hash_SHA_1
1b859752b41a2bb5589b84769155b28bdc964a48
Hash_SHA_256
2f9929778ab5a22dcef412ccbf37b950c0f8e76889d2ec19866290c674c78b1a
Hash_SHA_384
45ada614eb2a4ea05d27a9dd6b5d50cfed61dd0dd7d0f3d75c17cff7e992aa3fb552150dcb9ce11f6a9162dc9b06a3f2
Hash_SHA_512
e927e7ff856be33031ce2c383a7832451fbdbe615887fd49386aae94deff33f6eb11852f5db353ef7739c494df3d5605cd5c83a7f23da1145c8cbea6be82ba04
Mask_0_3
******* **lue
Mask_0_4
******* *alue
Mask_1_1
e****** ****e
Mask_2_2
ex***** ***ue
Mask_3_0
exa**** *****
Mask_3_3
exa**** **lue
Mask_4_0
exam*** *****
Mask_All
******* *****
Mask_CreditCard
XXXX-XXXX-XXXX-1234
Mask_Email_3_0
joh*******@cloudio.io
Mask_Email_3_3
joh*****son@cloudio.io