From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Protecting secrets
From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Protecting secrets
- [Instructor] To minimize the confidentiality risks to your application's data, you'll want to understand how to effectively protect those secrets. Fortunately, your developers have a number of options at their disposal for accomplishing this goal. A relatively simple solution for protecting secrets is through tokenization. When you tokenize sensitive data, you replace the sensitive parts with a non-sensitive alternative or token that references the original data. For example, say your application needs my 16-digit credit card number. You might store the actual number in a highly secured database while storing a token like JB12345 in another part of the application. If that token is ever compromised, so what? It's meaningless, but your developers can use tokens all throughout the application, enabling them to add more functionality to the application without needing to expose the secrets protected by those tokens. While tokenization helps reduce the need to access sensitive data, it…