{"id":66196,"date":"2024-12-16T12:14:40","date_gmt":"2024-12-16T01:14:40","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=66196"},"modified":"2024-12-16T12:14:42","modified_gmt":"2024-12-16T01:14:42","slug":"encryption-key-management","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/","title":{"rendered":"Have Your Data Under Lock and (Encryption) Key Management"},"content":{"rendered":"\n<p>Data is the lifeblood of any successful business. Nowadays, companies across all industries rely on various data platforms to manage their information. While innovations have made it easier for organisations to integrate and consolidate data from multiple sources, these advancements introduce increasingly sophisticated cyber threats. It\u2019s crucial for organisations to protect their data from unauthorised access, tampering, and alteration.<\/p>\n\n\n\n<p>In today\u2019s AI-driven world, it\u2019s no surprise that <a href=\"https:\/\/www.salesforce.com\/au\/platform\/data-security\/what-is-data-security\/\" target=\"_blank\" rel=\" noopener\">data security<\/a> \u2014 including effective data encryption key management \u2014 ranks as one of the top concerns for business and IT leaders. On top of that, strict <a href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/data-privacy\" target=\"_blank\" rel=\" noopener\">data privacy regulations<\/a> require organisations to implement robust protection measures, as failing to comply could lead to costly consequences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-don-t-let-your-data-walk-the-security-plank-nbsp\">Don\u2019t let your data walk the security plank&nbsp;<\/h2>\n\n\n\n<p>Having a <a href=\"https:\/\/www.salesforce.com\/resources\/guides\/data-security-governance-it-guide\/\" target=\"_blank\" rel=\" noopener\">solid data security strategy<\/a> is no longer optional \u2014 it\u2019s essential. Such a strategy helps you plan and integrate every aspect of data protection, from access control to compliance and threat detection.&nbsp;<\/p>\n\n\n\n<p>By adopting this approach, businesses can reduce the risk of data breaches, <a href=\"https:\/\/www.salesforce.com\/platform\/data-masking\/what-is-data-masking\/\" target=\"_blank\" rel=\" noopener\">protect sensitive customer information<\/a>, and meet regulatory requirements. In turn, this builds trust with customers and helps avoid hefty penalties.<\/p>\n\n\n\n<p>Two key elements of a strong data security strategy are <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.security_pe_masking.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">data encryption<\/a> and encryption key management. These tools help protect sensitive information by converting it into an unreadable format, making sure it stays secure even if someone unauthorised tries to access it. Understanding these concepts is crucial for any business looking to keep their data safe.<\/p>\n\n\n\n<div class=\"layout-astro wp-block-salesforce-blog-related-trail\">\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-cloud-layout-astro.png\" alt=\"\">\n\n\t\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__background\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-background-layout-astro.png\" alt=\"\">\n\n\t<div class=\"related-trail__wrapper\">\n\t\t<div class=\"related-trail__content\">\n\t\t\t\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 345.8 82.8\" aria-hidden=\"true\" class=\"related-trail__logo\"><path fill=\"#1d3767\" d=\"M96.6 33h9v22.6h4.8V33h8.8v-4.3H96.6zm49.8 5.3c0-5.7-3.6-9.6-10.8-9.6H127v27h4.8v-7.9h3l2.3-.1 5.7 8h5.6l-7-9.2c3.4-1.6 5-4.5 5-8.2m-11.1 5.3h-3.6V33h3.6c4.4 0 6 2.3 6 5.3s-1.6 5.3-6 5.3m30.8-15.2-12.6 27.2h5l2.3-5.3h11.6l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm25.2-17.7h4.8v27h-4.8zm20.7 0h-4.8v27h17.6v-4.4h-12.8zm38.4 12.1h-13.2V28.7H229v27h4.7V45h13.2v10.6h4.7V28.7h-4.7zm15.9 14.8h17.5v-4.4h-12.7v-6.4H279v-4.2h-11.5v-7.5h12.7v-4.4h-17.5zm36.9-27.2L287 55.6h5l2.3-5.3H306l2.4 5.3h5l-12.6-27.1zm-3.6 18 4.1-9.2 4.1 9.3zm35.4-17.7h-10.2v27h10.2c8.2 0 14.4-5.9 14.4-13.6s-6-13.4-14.4-13.4m0 22.6H326V33h5.4a9.1 9.1 0 1 1 0 18.1z\" \/><path fill=\"#1d315f\" d=\"M43 82.8h.1a74 74 0 0 0 38.5-12.3 3 3 0 0 0 1.3-2.4v-6A66.2 66.2 0 0 0 42.5.2a3 3 0 0 0-2.3 0A66.2 66.2 0 0 0 0 62.2V68a3 3 0 0 0 1.2 2.4 74 74 0 0 0 40.2 12.4z\" \/><path fill=\"#8ed1f4\" d=\"M13.8 51.8a.3.3 0 0 0 0-.1L33 23.6a3.1 3.1 0 0 1 .8-.8 3 3 0 0 1 4 .8l9.5 13.8 3.5-5a3 3 0 0 1 4.9 0L69 51.6a.3.3 0 0 1 .1.3h7C70.7 17.7 43.7 7.2 41.4 6.2c0 0-11.2 4-21.2 16A59.6 59.6 0 0 0 6.8 51.8zm21.7-21.3\" \/><path fill=\"#aa76b3\" d=\"m62 51.9-8.7-12.6-4.2 6.1 4.8 6.4z\" \/><path fill=\"#722a87\" d=\"m49 45.4-4.4 6.4H54z\" \/><path fill=\"#8ed1f4\" d=\"m37 32.6-1.5-2.1z\" \/><path fill=\"#aa76b3\" d=\"m28 41.4 7.6 10.4h1.8l6.4-9.2-6.8-10-1.5-2.1z\" \/><path fill=\"#722a87\" d=\"m28 41.4-7 10.4h14.6z\" \/><path fill=\"#069a49\" d=\"M43.8 72.5a1.8 1.8 0 0 0-1-2.4L40.1 69a8 8 0 0 1-1-.5 7.8 7.8 0 0 1-2.4-10.7H6a44 44 0 0 0-.2 4.4v4.4A70 70 0 0 0 26 75a70 70 0 0 0 15.2 2l2.4-4.3zm33-14.8H44.3l-2.5 3a1.7 1.7 0 0 0-.2.5 1.8 1.8 0 0 0 1 2.3l2.7 1.2.7.4a7.8 7.8 0 0 1 3 10.6l-.5.9 4.8-.8a71 71 0 0 0 8.4-2.2l1.3-.4a71 71 0 0 0 14-6.7v-8.8z\" \/><path fill=\"#fff\" d=\"m46 65-.7-.3-2.7-1.2a1.8 1.8 0 0 1-1-2.4 1.7 1.7 0 0 1 .2-.4l2.5-3h-7.6A7.8 7.8 0 0 0 39 68.4a8 8 0 0 0 1 .5l2.7 1.2a1.8 1.8 0 0 1 1 2.4l-.1.2-2.5 4.3a52.5 52.5 0 0 0 7.2-.4l.5-.9A7.8 7.8 0 0 0 46 65.1z\" \/><path fill=\"#157139\" d=\"M56.9 67.3h8.8l-4.4-5zM23 71h9l-4.5-5.1zm-4.1-10.4-4.5 5h8.9z\" \/><\/svg>\n\t\t\t<h2 class=\"wp-block-related-trail__title\">Get encrypted or get intercepted<\/h2>\n\t\t\t<p>Learn how you can encrypt your data at-rest in the cloud and manage the life cycle of your encryption keys on Trailhead, Salesforce\u2019s free online learning platform.<\/p>\n\t\t\t\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/trailhead.salesforce.com\/content\/learn\/modules\/spe_admins\" target=\"_blank\" rel=\" noopener\">Start learning<\/a><\/div>\n\n\t\t<\/div>\n\t\t<div class=\"related-trail__mock\">\n\t\t\t<div class=\"related-trail__points\">+700 points<\/div>\n\t\t\t<div class=\"related-trail__eyebrow\">Module<\/div>\n\t\t\t<p class=\"related-trail__trail-title h3\">Shield Platform Encryption<\/p>\n\t\t\t<p class=\"related-trail__trail-description\">Learn the ways of this trail.<\/p>\n\t\t\t<div class=\"related-trail__actions\">\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 10 10\" aria-hidden=\"true\"><path fill=\"#747474\" fill-rule=\"evenodd\" d=\"m4.93.69.88 2.88c.04.12.16.18.27.18h2.89c.29 0 .4.38.17.56L6.79 6.04c-.1.07-.13.2-.1.32l1.12 2.96c.08.27-.2.5-.44.33L4.85 7.77c-.1-.08-.23-.08-.34 0L1.97 9.65a.29.29 0 0 1-.45-.33L2.6 6.36a.3.3 0 0 0-.1-.32L.17 4.3c-.23-.18-.1-.56.17-.56h2.89c.13 0 .23-.04.27-.18l.9-2.9c.08-.27.46-.25.54.02Z\" clip-rule=\"evenodd\" \/><\/svg>\n<\/div>\n\t\t\t\t<div class=\"related-trail__action\">\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 9 5\" aria-hidden=\"true\"><path fill=\"#747474\" d=\"M4.16 4.5.26 0h7.8z\" \/><\/svg>\n<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__foreground\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-foreground-layout-astro.png\" alt=\"\">\n\t<img decoding=\"async\" class=\"related-trail__illustration related-trail__parks\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/related-trail-parks-layout-astro.png\" alt=\"\">\n\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is data encryption?<\/h2>\n\n\n\n<p>At its heart, <a href=\"https:\/\/www.salesforce.com\/ap\/resources\/articles\/what-data-encryption\/\" target=\"_blank\" rel=\" noopener\">data encryption<\/a> is all about protecting your information. It takes readable data and transforms it into an unreadable format known as ciphertext using algorithms. The only way to decode this ciphertext is with a corresponding encryption key. This means that even if someone unauthorised manages to access your data, they won\u2019t be able to interpret it without the right key.<\/p>\n\n\n\n<p>You can apply data encryption at different stages, whether the data is stored (what we call data at rest) or being transmitted (known as data in transit). This means that whether data is stored in databases, moving across networks, or resting on physical servers, it remains protected.<\/p>\n\n\n\n<p>For instance, organisations that use cloud services often encrypt data at rest. This way, even if there\u2019s a security breach and someone accesses the data, the information remains unreadable without the encryption keys.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is data encryption key management and why is it important?<\/h2>\n\n\n\n<p>While data encryption makes information unreadable to unauthorised users, <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=ind.comms_t_managing_encryption_keys_241121.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">encryption key management<\/a> governs how those keys are handled. This includes everything from generating and storing to distributing and retiring encryption keys securely. Effective key management is crucial because even the strongest encryption algorithms won\u2019t protect your data if the keys aren\u2019t properly controlled.<\/p>\n\n\n\n<p>Think of the encryption key like the key to a safe. You could have the most secure safe in the world, but if the key is easily accessible to the wrong people, your valuables are still at risk. The same goes for poor encryption key management, which can expose sensitive data and <a href=\"https:\/\/www.salesforce.com\/blog\/data-privacy-compliance\/\" target=\"_blank\" rel=\" noopener\">lead to breaches, regulatory non-compliance, and financial penalties<\/a>. Key management is essential for several reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security<\/strong>: If encryption keys are compromised, it can completely undermine data security and allow unauthorised access to encrypted information.<\/li>\n\n\n\n<li><strong>Regulatory compliance<\/strong>: Many regulations require organisations to show that they\u2019re properly managing encryption keys. Failing to do so can result in penalties.<\/li>\n\n\n\n<li><strong>Business continuity<\/strong>: Without effective key management, losing or mismanaging keys can lead to irreversible data loss.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">5 strategies for effective data encryption key management&nbsp;<\/h2>\n\n\n\n<p>To reduce risks and ensure effective encryption, businesses need to follow <a href=\"https:\/\/developer.salesforce.com\/docs\/atlas.en-us.securityImplGuide.meta\/securityImplGuide\/security_pe_best_practices.htm\" target=\"_blank\" rel=\" noopener\">best practices for encryption key management<\/a>. Some of the essential practices include:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Use strong encryption algorithms<\/h3>\n\n\n\n<p>The effectiveness of your encryption largely depends on the algorithms you choose. Go for algorithms that are widely recognised as secure, like the Advanced Encryption Standard (AES). Make sure your key lengths are robust enough to withstand brute-force attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Implement key rotation<\/h3>\n\n\n\n<p>Key rotation is the process of periodically replacing encryption keys with new ones. By regularly rotating keys, you limit the potential damage if a key gets compromised. When data is encrypted with new keys, the impact of previously compromised keys becomes much less significant. Rotating keys also reduces the risk of cracking the encryption keys due to overuse of the same key.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Segregation of duties<\/h3>\n\n\n\n<p>It\u2019s important to divide encryption key management responsibilities among different people or departments. For instance, the team handling encryption operations shouldn\u2019t have control over generating and storing the keys. This practice reduces the risk of insider threats and ensures that no single person or group has complete control over your encryption infrastructure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Monitor key usage<\/h3>\n\n\n\n<p>Set up monitoring systems that give you visibility into how encryption keys are being used. Keep track of who accessed or rotated the keys and when those actions took place. This kind of monitoring also helps you meet regulatory audit requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Automate key management systems<\/h3>\n\n\n\n<p>Using automated systems to manage encryption keys can help minimise human error. Automation ensures that keys are rotated on schedule, monitored for any misuse, and securely stored without needing manual intervention.<\/p>\n\n\n\n<p>These practices are crucial for businesses that handle large volumes of sensitive data. By following these guidelines, organisations can significantly reduce the risk of a security breach while staying compliant with regulations.<\/p>\n\n\n\n<div class=\"layout-one wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Are you staying ahead of emerging AI regulations?<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Read our white paper to explore key regulatory requirements facing customers globally, and how you can navigate the changing regulatory landscape and maintain customer trust with Salesforce.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_self\" href=\"https:\/\/www.salesforce.com\/form\/platform\/regulations-whitepaper\/\">Get started<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-one.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-one.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-one.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Platform Encryption for Data Cloud<\/h2>\n\n\n\n<p>Encrypting data stored in the cloud is essential for organisations that use platforms like Salesforce. <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.c360_a_platform_encryption_for_data_cloud.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">Platform Encryption for Data Cloud<\/a> enhances security by allowing businesses to encrypt their data with customer-managed keys (CMKs).<\/p>\n\n\n\n<p>This approach gives organisations greater control and flexibility over their encryption processes since they <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=release-notes.rn_security_pe_data_cloud.htm&amp;release=252&amp;type=5\" target=\"_blank\" rel=\" noopener\">can manage the keys themselves<\/a>. In addition to providing a solid foundation of encryption that secures data at rest, CMKs allow businesses to rotate, manage, and monitor encryption keys directly within Salesforce. Here are some key capabilities of Platform Encryption for Data Cloud:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Customer-managed keys (CMKs)<\/h3>\n\n\n\n<p>With <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.security_pe_enable_pe_for_data_cloud.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">customer-managed keys<\/a> (CMKs), you can use keys created by Salesforce to encrypt data at rest in <a href=\"https:\/\/www.salesforce.com\/data\/\" target=\"_blank\" rel=\" noopener\">Data Cloud<\/a>. While all data in Data Cloud is already encrypted at the infrastructure level, CMKs offer added convenience, along with an extra layer of security and control.&nbsp;<\/p>\n\n\n\n<p>They also help companies meet regulatory and compliance requirements by allowing them to manage encryption keys according to industry standards, like those outlined in <a href=\"https:\/\/compliance.salesforce.com\/en\/gdpr\" target=\"_blank\" rel=\" noopener\">General Data Protection Regulation<\/a> (GDPR), <a href=\"https:\/\/compliance.salesforce.com\/en\/hipaa\" target=\"_blank\" rel=\" noopener\">Health Insurance Portability and Accountability Act<\/a> (HIPAA), and <a href=\"https:\/\/compliance.salesforce.com\/en\/pci-dss\" target=\"_blank\" rel=\" noopener\">Payment Card Industry Data Security Standards<\/a> (PCI-DSS).<\/p>\n\n\n\n<p>Using Platform Encryption for Data Cloud, you can generate an encryption key right in Salesforce. The Data Cloud keys are unique to your organisation and are used to secure the data encryption keys (DEKs) that encrypt and decrypt your data. This means you have complete control over the chain of keys that protects your data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key rotation<\/h3>\n\n\n\n<p>Regular <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.security_pe_setup.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">key rotation<\/a> is essential for staying compliant with regulations, as many standards require periodic key changes to minimise the impact of a compromised key.\u00a0<\/p>\n\n\n\n<p>When a new key is generated, all new data is encrypted with that key, while older data can still be decrypted using previously used keys. This makes sure that access remains uninterrupted. Plus, these encryption keys are never stored on disk, adding an extra layer of protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Auditability and transparency<\/h3>\n\n\n\n<p>A standout feature of Shield <a href=\"https:\/\/www.google.com\/aclk?sa=l&amp;ai=DChcSEwjuvOCx9_-IAxUDEq0GHX-ZDJgYABAAGgJwdg&amp;co=1&amp;ase=2&amp;gclid=Cj0KCQjwsJO4BhDoARIsADDv4vD4NkvZTJ8mEYnpfwnBzlzao-jZf6gnoE8H9CuTL_LVIGUyjsdScOAaAu7_EALw_wcB&amp;sig=AOD64_06TxDf7i_vRYjhH0zUMVAWm2QWMw&amp;q&amp;nis=4&amp;adurl&amp;ved=2ahUKEwiW1Nqx9_-IAxW2FzQIHe16AMkQ0Qx6BAgIEAE\" target=\"_blank\" rel=\" noopener\">Platform Encryption<\/a> is its ability to provide detailed audit trails and encryption statistics. <\/p>\n\n\n\n<p>With tools like Setup Audit Trail, Encryption Statistics, and key details pages, businesses can <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=sf.security_pe_concepts.htm&amp;type=5\" target=\"_blank\" rel=\" noopener\">easily track and monitor key usage<\/a>, including who has rotated keys and when.&nbsp;This level of transparency is crucial for audit compliance and conducting internal security reviews.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enhanced control and compliance<\/h3>\n\n\n\n<p>With Shield Platform Encryption, businesses can also make sure that they meet regulatory requirements by managing the lifecycle of their encryption keys.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Extending Platform data encryption key management capabilities<\/h2>\n\n\n\n<p>Platform Encryption for Data Cloud makes it easy to rotate keys directly through the Salesforce UI, enhancing both convenience and transparency. The Shield Platform Encryption capabilities have been extended on the following screens:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-encryption-settings\">Encryption settings<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdIGA63ZG6WZAVsNFcVzSJXKDhEgLlAKC9gESdz5XgKakwOczQWWPcj2i40s8YnTisB26vzR30pYKHPursBn23_1gtZFc76D2RJ5deEzeZGU_FBFmiTo20YZMHqQmwwlR_vhb38wtZgXggwoTiFlbZYUWU_?key=I0XH7Ig0LLasNArODSKpCw\" width=\"624\" height=\"213\"><\/p>\n\n\n\n<p>In Encryption Settings, turn on the ability to manage your Data Cloud encryption keys in one click. You can allow encryption of your data in Data Cloud from a familiar UI under Platform Encryption in Setup.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Encryption key management<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXd8fHC72eoCzqiREWhsScjfLxKH-q5bnThp-yTpAorBUKpZ3pjZ8FaxM1gtxVTg9p9AiUHB1e9VSgTsnoLbYb_EzsOr23gFAyenvY63jzeY0WJjH8ma7dYlHWk-QVzMel8OYIxedUPqIHmjlTM35nYMO8kv?key=I0XH7Ig0LLasNArODSKpCw\" width=\"624\" height=\"245\"><\/strong><\/p>\n\n\n\n<p>Visit Key Management to find the new Data Cloud encryption tab, which includes the ability to rotate keys. Key rotation allows you to manage your keys the way you see fit. When a new key is generated, new data in Data Cloud will be encrypted with that key. The old key will automatically receive an \u201cArchived\u201d status but can still be used to decrypt previously ingested data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-encryption-statistics\">Encryption statistics<\/h3>\n\n\n\n<p><\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e6cc7d0de31&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e6cc7d0de31\" class=\"wp-block-image wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdf_jGCAhaEbQRBjlH6Du51I4-40Y7pyk66BidCYpPrIBd1pvwc83s0xfc7n1EPfZ-XXS7rnnxHVfFUrsx67NPvBlK4WyB7OC_GuER5EUN1AWM-mGu-owqNSas89erIziDiWtlijY-Fcc-JfTKJvut_q9IW?key=I0XH7Ig0LLasNArODSKpCw\" alt=\"\"\/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>Find more information to satisfy auditors in existing screens such as Setup Audit Trail, Encryption Statistics, and key details pages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Having data encryption keys in your back pocket<\/h2>\n\n\n\n<p>In a world where data breaches and cyber threats are becoming more frequent, businesses need to take proactive steps to secure their data. While data encryption serves as the first line of defence, managing encryption keys is just as important \u2014 if not more so \u2014 to ensure your security strategy holds strong.<\/p>\n\n\n\n<p>Salesforce\u2019s Platform Encryption for Data Cloud provides a powerful solution for organisations looking to manage their encryption keys with ease and transparency. By following best practices like key rotation, monitoring, and using strong encryption algorithms, businesses can bolster their security posture, stay compliant with regulations, and protect their sensitive data.<\/p>\n\n\n\n<p>As the security landscape continues to evolve, effective encryption key management will remain a vital part of any organization\u2019s data protection strategy.<\/p>\n\n\n\n<div class=\"layout-seven wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">\u201cSecure AI\u201d is not an oxymoron<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Learn from 4,000 IT pros on how to improve data quality, strengthen internal security, and build secure AI capabilities with our digital guide.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/state-of-it-security\/\">Get the free guide<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-seven.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-seven.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t let security slow you down \u2013 make it your engine for growth with encryption key management.<\/p>\n","protected":false},"author":528,"featured_media":66195,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2485,2504,3159,3162],"sf_content_type":[],"coauthors":[3250,3249],"class_list":["post-66196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-data-culture","sf_topic-it","sf_topic-data-compliance","sf_topic-data-security-standards"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Essential Guide to Encryption Key Management<\/title>\n<meta name=\"description\" content=\"Discover the importance of encryption key management in safeguarding sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Have Your Data Under Lock and (Encryption) Key Management\" \/>\n<meta property=\"og:description\" content=\"Don\u2019t let security slow you down \u2013 make it your engine for growth with encryption key management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T01:14:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T01:14:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dave Hacker, Krassimira Iordanova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave Hacker and Krassimira Iordanova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/898d1cf5e806f64ecad136ea7d96f55c\"},{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/61344d120476d32fc494c082e2dacd13\"}],\"headline\":\"Have Your Data Under Lock and (Encryption) Key Management\",\"datePublished\":\"2024-12-16T01:14:40+00:00\",\"dateModified\":\"2024-12-16T01:14:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\"},\"wordCount\":1615,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\",\"name\":\"Essential Guide to Encryption Key Management\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg\",\"datePublished\":\"2024-12-16T01:14:40+00:00\",\"dateModified\":\"2024-12-16T01:14:42+00:00\",\"description\":\"Discover the importance of encryption key management in safeguarding sensitive data.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg\",\"width\":1500,\"height\":844,\"caption\":\"With strong encryption key management, security can drive innovation, build trust, and keep your data protected. [Salesforce | Aleona Pollauf]\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/898d1cf5e806f64ecad136ea7d96f55c\",\"name\":\"Dave Hacker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Dave Hacker\"},\"description\":\"I bring 20+ years of product management and engineering experience with expertise in the Salesforce Platform. Prior to Salesforce, I've helped grow several tech companies by helping to make their products better.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/dave-hacker\/\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/61344d120476d32fc494c082e2dacd13\",\"name\":\"Krassimira Iordanova\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Krassimira Iordanova\"},\"description\":\"I bring 20+ years of product management, sales development, and consulting experience with intimate knowledge of Salesforce Data Cloud, Salesforce Marketing Cloud, Service Cloud, and Sales Cloud. I'm 6X Salesforce certified. Prior to Salesforce, I worked for Oracle and SAP.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/krassimira-iordanova\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential Guide to Encryption Key Management","description":"Discover the importance of encryption key management in safeguarding sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/","og_type":"article","og_title":"Have Your Data Under Lock and (Encryption) Key Management","og_description":"Don\u2019t let security slow you down \u2013 make it your engine for growth with encryption key management.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2024-12-16T01:14:40+00:00","article_modified_time":"2024-12-16T01:14:42+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","type":"image\/jpeg"}],"author":"Dave Hacker, Krassimira Iordanova","twitter_card":"summary_large_image","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Dave Hacker and Krassimira Iordanova","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/898d1cf5e806f64ecad136ea7d96f55c"},{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/61344d120476d32fc494c082e2dacd13"}],"headline":"Have Your Data Under Lock and (Encryption) Key Management","datePublished":"2024-12-16T01:14:40+00:00","dateModified":"2024-12-16T01:14:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/"},"wordCount":1615,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/","url":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/","name":"Essential Guide to Encryption Key Management","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","datePublished":"2024-12-16T01:14:40+00:00","dateModified":"2024-12-16T01:14:42+00:00","description":"Discover the importance of encryption key management in safeguarding sensitive data.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/encryption-key-management\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","width":1500,"height":844,"caption":"With strong encryption key management, security can drive innovation, build trust, and keep your data protected. [Salesforce | Aleona Pollauf]"},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/898d1cf5e806f64ecad136ea7d96f55c","name":"Dave Hacker","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Dave Hacker"},"description":"I bring 20+ years of product management and engineering experience with expertise in the Salesforce Platform. Prior to Salesforce, I've helped grow several tech companies by helping to make their products better.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/dave-hacker\/"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/61344d120476d32fc494c082e2dacd13","name":"Krassimira Iordanova","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Krassimira Iordanova"},"description":"I bring 20+ years of product management, sales development, and consulting experience with intimate knowledge of Salesforce Data Cloud, Salesforce Marketing Cloud, Service Cloud, and Sales Cloud. I'm 6X Salesforce certified. Prior to Salesforce, I worked for Oracle and SAP.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/krassimira-iordanova\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2504,"name":"IT","slug":"it","term_group":0,"term_taxonomy_id":2504,"taxonomy":"sf_topic","description":"","parent":0,"count":72,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2024\/10\/TSK-38072_Enhance_Data_Security_in_Data_Cloud_with_Platform_Encryption.jpg?w=1500","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/528"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=66196"}],"version-history":[{"count":2,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66196\/revisions"}],"predecessor-version":[{"id":66274,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/66196\/revisions\/66274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/66195"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=66196"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=66196"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=66196"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=66196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}