Using multiple encryption modules
-
- UpdatedJan 30, 2025
- 3 minutes to read
- Yokohama
- Now Platform Security
Multiple encryption modules enable data to be encrypted with more than one encryption module. If each module has its own access policy based on a role, for example, users with different roles can encrypt data on the same table but they can still be prevented from viewing each others encrypted data.
Before you begin
Role required: sn_kmf.cryptographic_manager or sn_kmf.admin
About this task
You cannot change a field using multiple encryption modules to use a single encryption module.
The field is encrypted by the encryption module of the first user to enter data. Because the encryption module is set on a per record basis, fields in a list can have different encryption modules. Within a single record, the field can be encrypted by only one module.
Procedure
Result
Newly created data for the specified field is encrypted with the key of the relevant module. When a user with the role specified in module A's access policy writes to the specified table, the data is encrypted with module A's key. Only users with the same role can read the data.
Example
- Create two cryptographic modules A and B.
- For each module, create a module access policy.
For module A, give users with an HR role access. For module B, give users with a Sales role access.
- Create an Encrypted Field Configuration record specifying the Short Description column on the Incident table, and make sure that you select Multiple Modules in the Method field.
- Have two users, one with the HR role (user A) and one with the Sales role
(user B), create an incident with a short description, and then have both
users look at the list of incidents.
The short description for the incident created by the user with the HR role is encrypted by the key for module A. Likewise, the short description for the incident created by the user with the Sales role is encrypted by the key for module B.
Although all users with the HR and Sales roles have access to incidents, only a user with the HR role can decrypt and view the short description for those incidents created by user A, who had the HR role. Likewise, only users with the Sales role can decrypt and view the short descriptions for those incidents created by the user B, who had the Sales role.
