Tagged articles
5 articles
Page 1 of 1
Architecture Breakthrough
Architecture Breakthrough
Dec 9, 2025 · Information Security

Why Log Masking Must Prioritize Compliance Over Debug Efficiency: 5 Guiding Principles

The article outlines five practical principles for implementing log masking in large development organizations, emphasizing legal compliance as a non‑negotiable red line, advocating aggressive over‑masking, avoiding long‑term technical debt, driving top‑down adoption, and redefining the architect’s role to ensure effective, sustainable data protection.

Information SecurityTechnical Debtdata compliance
0 likes · 5 min read
Why Log Masking Must Prioritize Compliance Over Debug Efficiency: 5 Guiding Principles
Yum! Tech Team
Yum! Tech Team
Feb 6, 2024 · Information Security

Log Data Masking Solution for Java Spring Applications

This article analyzes the growing risk of personal data leakage, defines data masking, compares common log‑masking techniques, and presents a comprehensive Java‑Spring solution that combines annotation‑based marking, custom Jackson serializers, and extended SLF4J methods to achieve precise, low‑overhead log masking.

data maskinglog maskingslf4j
0 likes · 8 min read
Log Data Masking Solution for Java Spring Applications
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Aug 31, 2020 · Backend Development

Using Java Annotations for Log Masking and Bank API Request Simplification

This article explains how to employ custom Java annotations together with reflection to mask sensitive fields in logs, define flexible desensitization rules, and dramatically reduce repetitive code when building fixed‑length, signed bank API requests, improving maintainability and extensibility of backend services.

Bank APIReflectionannotations
0 likes · 21 min read
Using Java Annotations for Log Masking and Bank API Request Simplification