How Data Masking Protects Sensitive Information: Techniques and Best Practices
This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.
Recently I kept receiving strange calls from a so‑called high‑end men’s private club, which made me realize my personal information had likely been leaked by an unscrupulous website, highlighting the need for internal data protection.
As developers, we can mitigate privacy breaches by employing data masking (data desensitization) techniques.
What Is Data Masking
Data masking, also called data de‑identification, transforms sensitive data such as phone number and bank card number according to defined rules, preventing direct use of raw data in unreliable environments.
Governments, healthcare, finance, and telecom sectors have long adopted data masking because the consequences of leaks are severe.
Common examples include masking parts of a phone number with “*” in e‑commerce order details to protect merchant privacy.
Static Data Masking (SDM)
SDM is used to extract production data, mask it, and then distribute the sanitized version to testing, development, training, or analytics environments.
For example, copying production data to a test database after masking sensitive fields ensures security while meeting business needs.
The masked data remains isolated from production, preserving safety.
Dynamic Data Masking (DDM)
DDM applies masking in real time within production environments, allowing different masking levels based on user roles or permissions.
While removing sensitive content, DDM must retain data characteristics, business rules, and relationships to keep applications functional.
Data Masking Techniques
Various schemes can be defined per business scenario, including:
1. Nullification
Replace sensitive values with special characters such as “*”, truncation, encryption, or hiding.
2. Random Values
Replace characters with random letters or numbers, preserving format while obscuring original data.
3. Data Substitution
Replace fields with a predefined dummy value, e.g., setting all phone numbers to “13651300000”.
4. Symmetric Encryption
Encrypt sensitive data using reversible encryption; the ciphertext follows the same logical format as the original.
5. Averaging
For numeric fields, compute the average and generate values around it, keeping total sums unchanged.
6. Offset and Rounding
Shift numeric values randomly and round them, maintaining approximate realism for large‑scale analysis.
In practice, multiple techniques are often combined to achieve higher security levels.
Conclusion
Both static and dynamic masking aim to prevent internal misuse of private data and its uncontrolled flow out of an organization; developers must uphold data confidentiality as a fundamental responsibility.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Su San Talks Tech
Su San, former staff at several leading tech companies, is a top creator on Juejin and a premium creator on CSDN, and runs the free coding practice site www.susan.net.cn.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
