Data Security & Privacy

Masking, Hashing & Encryption in real-time at scale

Use the Data Security Rules screen to defined the rules at various levels as shown below. These rules will be applied on incoming data as a very first step and hence the data stays secured in all stages of the pipeline.

Data Security Rules

Rule

Example Outcome

Clear

Encrypt_AES

1P204LE2cf5b8utiiiSFPQ==

Hash_MD2

3073ab56bd093705ebcaa59b70b55f5c

Hash_MD5

6bad7e8404558aafa56e9b15195bba76

Hash_SHA_1

1b859752b41a2bb5589b84769155b28bdc964a48

Hash_SHA_256

2f9929778ab5a22dcef412ccbf37b950c0f8e76889d2ec19866290c674c78b1a

Hash_SHA_384

45ada614eb2a4ea05d27a9dd6b5d50cfed61dd0dd7d0f3d75c17cff7e992aa3fb552150dcb9ce11f6a9162dc9b06a3f2

Hash_SHA_512

e927e7ff856be33031ce2c383a7832451fbdbe615887fd49386aae94deff33f6eb11852f5db353ef7739c494df3d5605cd5c83a7f23da1145c8cbea6be82ba04

Mask_0_3

******* **lue

Mask_0_4

******* *alue

Mask_1_1

e****** ****e

Mask_2_2

ex***** ***ue

Mask_3_0

exa**** *****

Mask_3_3

exa**** **lue

Mask_4_0

exam*** *****

Mask_All

******* *****

Mask_CreditCard

XXXX-XXXX-XXXX-1234

Mask_Email_3_0

joh*******@cloudio.io

Mask_Email_3_3

Last updated

Was this helpful?