Tagged articles
5 articles
Page 1 of 1
Architect
Architect
Sep 8, 2025 · Information Security

Mask Sensitive Data in Java with YAML Rules – A Step‑by‑Step Guide

This article demonstrates a practical approach to data desensitization in Java applications by storing masking rules in YAML files, loading them into maps, and recursively applying regex‑based transformations to nested response structures without using AOP annotations, complete with sample code and execution results.

data maskingdesensitizationjava
0 likes · 22 min read
Mask Sensitive Data in Java with YAML Rules – A Step‑by‑Step Guide
Alibaba Cloud Native
Alibaba Cloud Native
Dec 11, 2024 · Information Security

How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud

This guide walks through why enterprises need to scan and protect sensitive log data, explains the regulatory background, and provides a step‑by‑step implementation on Alibaba Cloud using Data Security Center, Logtail, SPL, Ingest Processors, SDKs, StoreView queries and periodic scans to achieve comprehensive data security and governance.

Log Managementcloud-nativedata security
0 likes · 18 min read
How to Secure Cloud Logs: End‑to‑End Sensitive Data Scanning and Masking on Alibaba Cloud
Architect
Architect
Feb 22, 2023 · Backend Development

Custom Logback Desensitization Component (slf4j + logback) – Usage and Configuration Guide

This article explains how to securely mask sensitive data in log output by using either a conversionRule tag with MessageConverter or a custom utility class, and provides a step‑by‑step guide to integrate a reusable Logback desensitization component with Maven dependency, appender replacement, and YAML configuration.

configurationdesensitizationlogback
0 likes · 10 min read
Custom Logback Desensitization Component (slf4j + logback) – Usage and Configuration Guide
Architect
Architect
Jul 19, 2022 · Information Security

Custom Logback Desensitization Component: Configuration and Usage Guide

This article introduces a Logback desensitization component for Java applications, explains two common masking approaches, compares their pros and cons, and provides step‑by‑step instructions—including Maven dependency, appender replacement, YAML configuration, supported data types, matching rules, custom regex, and jar installation—to securely mask sensitive information in logs.

data maskingdesensitizationlogback
0 likes · 12 min read
Custom Logback Desensitization Component: Configuration and Usage Guide
Programmer DD
Programmer DD
Jul 15, 2022 · Information Security

Secure Your Java Logs: A Step‑by‑Step Guide to Logback Desensitization

This article explains why sensitive data in logs must be masked, compares two common masking approaches, and provides a complete tutorial for integrating a custom Logback desensitization component—including Maven dependency, appender replacement, configuration file format, supported data types, matching rules, and installation instructions—so developers can achieve secure logging with minimal code changes.

Maskingdesensitization
0 likes · 12 min read
Secure Your Java Logs: A Step‑by‑Step Guide to Logback Desensitization