Applying Data Protection in Our Applications
- Jen C

- Dec 18, 2025
- 3 min read

Securing sensitive data stored and transmitted within our applications is a significant concern. To address this, we need robust encryption, strong access controls, and a thorough
understanding of data protection techniques. In this article, we'll explore the importance of using data protection in our applications. “With Little Miss Sunshine, Rihanna, Where you at?"
An Umbrella Analogy
An umbrella and data protection both act as shields. An umbrella protects you from rain (physical harm) while data protection techniques protect sensitive information (digital harm) from authorized access. Sensitive information or data is anything we need to protect an individual or organization from unauthorized access. We’ve talked in the past about PII, personally identifying information, and some examples include passwords, account numbers, contact information, and even demographic information. To protect both data in transit and at rest, we need to implement comprehensive security measures. Regardless, we need to safeguard both data in transit and at rest.
The umbrella acts as a shield, composed of the canopy and frame. Data protection uses things like encryption as its shield. Encryption is necessary because it’s used to protect data from being stolen or changed (or compromised). It scrambles the information all up (ciphertext) and relies on a secret code (a decoder ring, maybe?) to unlock it with a unique key. If you try to read the data without the key, it’s, well, unreadable, and it’s protected. Encrypting data at rest protects data stored on a device or server from unauthorized access. It’s important because even if an attacker gains unauthorized access to the system, if they don’t have the key, they can’t read the data. You can encrypt the entire system (hard drive), at the directory or file level, or even specific data fields.

Data in transit needs to be secured by preventing compromise through confidentiality, integrity, and availability. This is what’s known as the CIA triad in cybersecurity. To explain quickly, confidentiality is the principle that only authorized individuals can access data. Integrity is that the data is accurate and uncompromised. Availability is for authorized access when needed. To secure data in transit, use HTTPS and SSH protocols to encrypt data during transmission from one device or system to another over the internet or a network. HTTPS (SSL/TLS) establishes a secure connection (a tunnel) between the two, with encryption applied as data transits through it.
The umbrella’s whole purpose is to keep us dry and repel water. Some overall things to consider for successful encryption include:
Keeping up-to-date versions of encryption protocols and algorithms
Choosing the correct encryption protocol for the requirements of the data
Proper storage and management of encryption keys
For non-production environments or scenarios where intense encryption isn't necessary, consider using data masking. This technique replaces sensitive data with non-sensitive, realistic-looking fictitious data. Data masking techniques include:
Hashing: Replaces data with a fixed-size string of characters (e.g., SHA-256).
Redaction: Removes or replaces sensitive data with a placeholder.
Tokenization: Substitutes sensitive data with an alias or token.
Shuffling: Rearranges the order of data elements to obscure their relationships.
Substitution: Replaces specific characters or words with more innocuous alternatives.
Perturbation: Alters data in a way that makes it difficult for unauthorized parties to recognize its original form.
Data masking can be static (for data at rest) or dynamic (for on-the-fly access).
To further strengthen your application's security, implement strong authentication and role-based access controls. Regularly review users, roles, and permissions to ensure that sensitive data is only accessible by authorized personnel.
The rain itself is considered a threat because it leaves us with a wet, icky feeling and with potential hazards (sloshy shoes?).
Data protection failures can lead to various threats:
Data breaches: Unauthorized access to sensitive information.
Cyberattacks: Malicious attempts to compromise or disrupt systems.
Reputational damage: Negative consequences for organizations that fail to protect their data.
By implementing robust encryption, managing encryption keys effectively, and regularly updating protocols/algorithms, you can safeguard your applications against these risks.
In conclusion, protecting sensitive data is a vital responsibility in application development. By understanding the importance of data protection, using techniques like encryption, and implementing best practices for its use, we can keep our applications safe from unauthorized access and potential threats.
“It’s a big enough umbrella, but it’s always me that ends up getting wet!”
(Every Little Thing She Does Is Magic-The Police)




Comments