Read more on NAV Design Patterns wiki site\u2026<\/a><\/p>\nBy Bogdana Botez at Microsoft Development Center Copenhagen<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Context: After applying Sensitive Data Encapsulation, all sensitive data is gathered in a known place in the database. This makes it possible to apply further protection best practices. Problem: If any non-authorized actor manages to get access to a copy of the database, the sensitive data is immediately available in clear-text. Forces: Accessibility: anyone who<\/p>\n","protected":false},"author":4552,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"post_tag":[],"product":[],"content-type":[18],"topic":[],"audience-type":[],"audience":[4684],"ms-author":[],"coauthors":[2302],"class_list":["post-12945","post","type-post","status-publish","format-standard","hentry","content-type-thought-leadership","audience-business-leader"],"yoast_head":"\n
Design Pattern: Security - Data Encryption - Microsoft Dynamics 365 Blog<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n\t\n\t\n