{"id":12945,"date":"2016-09-23T10:00:36","date_gmt":"2016-09-23T08:00:36","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/nav\/?p=12945"},"modified":"2024-03-05T11:41:22","modified_gmt":"2024-03-05T19:41:22","slug":"design-pattern-security-data-encryption","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/dynamics-365\/blog\/business-leader\/2016\/09\/23\/design-pattern-security-data-encryption\/","title":{"rendered":"Design Pattern: Security – Data Encryption"},"content":{"rendered":"

\"<\/a>
\n<\/em><\/p>\n

Context<\/b>: After applying Sensitive Data Encapsulation<\/b>, all sensitive data is gathered in a known place in the database. This makes it possible to apply further protection best practices.<\/p>\n

Problem<\/b>: If any non-authorized actor manages to get access to a copy of the database, the sensitive data is immediately available in clear-text.<\/p>\n

Forces:<\/b><\/p>\n