Источник:
http://feedproxy.google.com/~r/Micro...3/cqTbKYgU3X8/
==============
Context: After applying Sensitive Data Encapsulation, all sensitive data is gathered in a known place in the database. This makes it possible to apply further protection best practices. Problem: If any non-authorized actor manages to get access to a copy of the database, the sensitive data is immediately available in clear-text. Forces: Accessibility: anyone who...
Источник:
http://feedproxy.google.com/~r/Micro...3/cqTbKYgU3X8/