Existing Application
π Overview
π Step 1: Identify PII Data to Protect
βοΈ Step 2: Define Encryption Rules in config.yaml
config.yamlrules:
sql:
your_database:
compatibility_mode: true
scheme: public
write:
users:
email:
hash: true
username:
hash: true
phone_number:
hash: true
profiles:
first_name:
hash: true
last_name:
hash: true
attributes:
value:
hash: trueποΈ Step 3: Install the Encryption Proxy
π₯ Step 4: Add New Columns to Support Encryption
π Step 5: Run Migration to Encrypt Existing Data
π Step 6: Switch Application to Use Encryption Proxy
β
Step 7: Validate Application Behavior
π Security Notes
π Success Criteria
π Next Steps
Last updated