Envelope encryption
First and foremost, effective application level encryption is predicated on strong security-by-design practices. As teams architect the feature roadmap, the sensitivity level of the features must be classified. This starts to drive the design of the domain model, such that sensitive data is properly isolated. At the story level, a team will identify the exact data elements that must be encrypted, evaluate alternatives such as tokenization, determining if the data needs to be queried and filtered by encrypted fields, and whether or not the sensitive data should be included in domain events.
Teams will use the cloud provider's key management service to encrypt sensitive fields using an approach called envelope encryption ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access