You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/utilities/data_masking.md
+8-16Lines changed: 8 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -206,8 +206,8 @@ For a stronger security posture, you can add metadata to each encryption operati
206
206
### Choosing parts of your data
207
207
208
208
???+ note "Current limitations"
209
-
1. The `fields` parameter is currently exclusive to the `erase` method, with potential future inclusion into `encrypt` and `decrypt`.
210
-
2. We support `JSON` data types only - see [data serialization for more details](#data-serialization)."
209
+
1. The `fields` parameter is not yet supported in `encrypt` and `decrypt` operations.
210
+
2. We support `JSON` data types only - see [data serialization for more details](#data-serialization).
211
211
212
212
You can use the `fields` parameter with the dot notation `.` to choose one or more parts of your data to `erase`. This is useful when you want to keep data structure intact except the confidential fields.
213
213
@@ -407,9 +407,7 @@ When decrypting, we revert the operation to restore the original data structure.
407
407
408
408
For compatibility or performance, you can optionally pass your own JSON serializer and deserializer to replace `json.dumps` and `json.loads` respectively:
@@ -440,19 +436,15 @@ You can pass additional arguments to the `AWSEncryptionSDKProvider` via the `pro
440
436
441
437
For example, the AWS Encryption SDK defaults to using the `AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384` algorithm for encrypting your Data Key. If you want, you have the flexibility to customize and choose a different encryption algorithm.
The `AWSEncryptionSDKProvider` allows you to instantiate it with several KMS keys by passing them all in a `list` to the `keys` parameter. This could be beneficial if you own keys in different regions, enabling you to perform cross-regional encryption and decryption.
443
+
##### Using multiple keys
452
444
453
-
=== "using_multiple_keys.py"
445
+
You can use multiple KMS keys from more than one AWS account for higher availability, when instantiating `AWSEncryptionSDKProvider`.
0 commit comments