Data Security & Privacy
Masking, Hashing & Encryption in real-time at scale
Use the Data Security Rules screen to defined the rules at various levels as shown below. These rules will be applied on incoming data as a very first step and hence the data stays secured in all stages of the pipeline.

Rule
Example Outcome
Clear
Encrypt_AES
1P204LE2cf5b8utiiiSFPQ==
Hash_MD2
3073ab56bd093705ebcaa59b70b55f5c
Hash_MD5
6bad7e8404558aafa56e9b15195bba76
Hash_SHA_1
1b859752b41a2bb5589b84769155b28bdc964a48
Hash_SHA_256
2f9929778ab5a22dcef412ccbf37b950c0f8e76889d2ec19866290c674c78b1a
Hash_SHA_384
45ada614eb2a4ea05d27a9dd6b5d50cfed61dd0dd7d0f3d75c17cff7e992aa3fb552150dcb9ce11f6a9162dc9b06a3f2
Hash_SHA_512
e927e7ff856be33031ce2c383a7832451fbdbe615887fd49386aae94deff33f6eb11852f5db353ef7739c494df3d5605cd5c83a7f23da1145c8cbea6be82ba04
Mask_0_3
******* **lue
Mask_0_4
******* *alue
Mask_1_1
e****** ****e
Mask_2_2
ex***** ***ue
Mask_3_0
exa**** *****
Mask_3_3
exa**** **lue
Mask_4_0
exam*** *****
Mask_All
******* *****
Mask_CreditCard
XXXX-XXXX-XXXX-1234
Mask_Email_3_0
joh*******@cloudio.io
Mask_Email_3_3
joh*****[email protected]
Last updated
Was this helpful?