Setting Data Encryption

Setting Data Encryption

Data encryption is a way to safeguard personal or sensitive information like credit card details, backup phone numbers, personal identification numbers etc. that are stored in your Solutions database. It prevents the data from being stolen or lost by converting the plain (or readable) text into cipher (or non-readable) text that is accessible only to the authorized parties. Even if a potential hacker gets a hold of the data, the information stored in the cipher text is non-readable.    

In Vertical Solutions, you can encrypt custom fields using AES. Encrypting the data does not come in the way of the effective and quick use of Vertical Solutions, by authorized users.

Feature Specifications

Field and Module-based specifications

  1. Only Custom fields (new and existing) can be encrypted. Once a field is marked as Unique, it cannot be encrypted. Similarly, once a field is encrypted you cannot mark it as Unique. 
  2. Fields that can be encrypted are Single Line, Email, Phone, Number, Multi line (small), Date, Date-Time, Currency, Decimal, and Long Integer.
  3. Data encryption is available for all standard (except Tasks, Calls, and Meetings) and custom modules. 
  4. Encryption can be disabled for a field at any time.
  5. In Lead Conversion Mapping, data can be converted and stored only between two encrypted fields.
  6. Encrypted fields can be used as inputs in Formula fields.

Handling encrypted data

  1. Find & Merge and Deduplication  are supported for encrypted fields.
  2. Any data imported to encrypted fields will be encrypted by default and exported data are decrypted.
  3. Encrypted fields can be included in Web forms.
  4. Encrypted field can be displayed in Reports  as a column, but cannot be used in Criteria and Columns to Total.
  5. Encrypted fields can be used as inputs in custom functions, and as merge fields in templates.
  6. APIs are supported for encrypted data.
  7. Encrypted fields can be used in integrations too. Utilizing the information in integrations are entirely at the user's risk.

Limitations and Trade-offs

  1. Only full-text search is supported in global search. For instance, if the encrypted data is "Joseph Wells," the encrypted field record does not show in the results of a search for "Joseph."
  2. Encrypted fields cannot be used in Advanced Filters
  3. Encrypted fields cannot be found using Search by Criteria
  4. Encrypted fields are not visible in Sort option.
  5. The encrypted information is only stored in the Zoho Servers. Use the encrypted information outside Zoho Servers or third-party services at your own discretion.
  6. In the  Forecasts  module, encrypted fields cannot be used as Target Fields.
  7. When a field is encrypted, the following operators will be supported in the criteria: 
    1. Single line, Phone, Email, Small multi-line (character limit of 2000), Date, Date-Time, and Currency - is empty and is not empty
    2. Number, Decimal, Long integer - =, !=, is empty, and is not empty. 
File encryption: All the attachments are encrypted by default once added to Solutions. 
Email encryption: Emails sent and received via Solutions will be encrypted at rest.
Read more about how data encryption takes place at Zoho.

To encrypt/decrypt custom fields:
1. Go to  Setup > Customization > Modules and Fields > [Select the module] .
2. In the module layout editor, go to the field you wish to encrypt, click the  Settings icon  and select Edit Properties.
3. In the Field Properties popup, select the Encrypt Field checkbox. 
4. Click Done.
5. Save the layout.

Encryption Process at Vertical Solutions 

 Encryption can be used in two situations.
  1. Encryption in Transit
  2. Encryption at Rest (EAR)

Encryption in Transit
Refers to data that is encrypted when it is in transit — including from your browser to the web server and other third parties via integrations.
Encrypting data in transit protects your data from man-in-the-middle-attacks. Read more.

Encryption at Rest
Refers to data that is encrypted when it is stored (not moving) — either on a disc, in a database, or some other form of media. In addition to encryption of data during transit, encryption of data when it is stored in the servers provides an even higher level of security. EAR protects against any possible data leak due to server compromise or unauthorized access.
Encryption is done at the application layer using the AES-256 algorithm which is a symmetric encryption algorithm and uses 128-bit blocks and 256-bit keys. The key used to convert the data from plain text to cipher text is called Data Encryption Key(DEK). The DEK is further encrypted using the KEK (Key Encryption Key),
thus, providing yet another layer of security. The keys are generated and maintained by our in-house Key Management Service (KMS). Read more.