Skip to content

Commit 8f40a15

Browse files
Addressing Heitor's feedback
1 parent b374d9f commit 8f40a15

File tree

1 file changed

+8
-16
lines changed

1 file changed

+8
-16
lines changed

docs/utilities/data_masking.md

Lines changed: 8 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -206,8 +206,8 @@ For a stronger security posture, you can add metadata to each encryption operati
206206
### Choosing parts of your data
207207

208208
???+ note "Current limitations"
209-
1. The `fields` parameter is currently exclusive to the `erase` method, with potential future inclusion into `encrypt` and `decrypt`.
210-
2. We support `JSON` data types only - see [data serialization for more details](#data-serialization)."
209+
1. The `fields` parameter is not yet supported in `encrypt` and `decrypt` operations.
210+
2. We support `JSON` data types only - see [data serialization for more details](#data-serialization).
211211

212212
You can use the `fields` parameter with the dot notation `.` to choose one or more parts of your data to `erase`. This is useful when you want to keep data structure intact except the confidential fields.
213213

@@ -407,9 +407,7 @@ When decrypting, we revert the operation to restore the original data structure.
407407

408408
For compatibility or performance, you can optionally pass your own JSON serializer and deserializer to replace `json.dumps` and `json.loads` respectively:
409409

410-
=== "advanced_custom_serializer.py"
411-
412-
```python hl_lines="17-18"
410+
```python hl_lines="17-18" title="advanced_custom_serializer.py"
413411
--8<-- "examples/data_masking/src/advanced_custom_serializer.py"
414412
```
415413

@@ -428,9 +426,7 @@ You can modify the following values when initializing the `AWSEncryptionSDKProvi
428426

429427
If required, you have the option to customize the default values when initializing the `AWSEncryptionSDKProvider` class.
430428

431-
=== "aws_encryption_provider_example.py"
432-
433-
```python hl_lines="14-19"
429+
```python hl_lines="14-19" title="aws_encryption_provider_example.py"
434430
--8<-- "examples/data_masking/src/aws_encryption_provider_example.py"
435431
```
436432

@@ -440,19 +436,15 @@ You can pass additional arguments to the `AWSEncryptionSDKProvider` via the `pro
440436

441437
For example, the AWS Encryption SDK defaults to using the `AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384` algorithm for encrypting your Data Key. If you want, you have the flexibility to customize and choose a different encryption algorithm.
442438

443-
=== "changing_default_algorithm.py"
444-
445-
```python hl_lines="5 26 30"
439+
```python hl_lines="5 26 30" title="changing_default_algorithm.py"
446440
--8<-- "examples/data_masking/src/changing_default_algorithm.py"
447441
```
448442

449-
**Using multiple keys**
450-
451-
The `AWSEncryptionSDKProvider` allows you to instantiate it with several KMS keys by passing them all in a `list` to the `keys` parameter. This could be beneficial if you own keys in different regions, enabling you to perform cross-regional encryption and decryption.
443+
##### Using multiple keys
452444

453-
=== "using_multiple_keys.py"
445+
You can use multiple KMS keys from more than one AWS account for higher availability, when instantiating `AWSEncryptionSDKProvider`.
454446

455-
```python hl_lines="15"
447+
```python hl_lines="15" title="using_multiple_keys.py"
456448
--8<-- "examples/data_masking/src/using_multiple_keys.py"
457449
```
458450

0 commit comments

Comments
 (0)