Interactive Encryption Patterns Explorer
See field-level encryption in action! Use the interactive explorer below to step through 6 stages of progressive encryption patterns. Watch as sensitive fields are encrypted while preserving analytics-safe metadata.
How to Use This Explorer
- Navigate using arrow keys (← →) or click the numbered stage buttons
- Compare the Input (left) and Output (right) JSON at each stage
- Observe how sensitive fields are encrypted (red strikethrough) while analytics data is preserved (green highlight)
- Inspect the YAML code showing exactly what processors were added
- Learn from the stage description explaining the encryption technique and compliance benefit
Interactive Encryption Patterns Explorer
Original Sensitive Data
Raw payment and customer data with multiple compliance violations requiring immediate field-level encryption.
Use ← → arrow keys to navigate
📥Input
{
"transaction_id": "txn-12345",
"payment": {
"card_number": "4532-1234-5678-9010",
"cvv": "123",
"cardholder_name": "Sarah Johnson"
},
"customer": {
"ssn": "123-45-6789"
}
}
📤Output
{
"transaction_id": "txn-12345",
"payment": {
"card_number": "4532-1234-5678-9010",
"cvv": "123",
"cardholder_name": "Sarah Johnson"
},
"customer": {
"ssn": "123-45-6789"
}
}
Added/Changed
Removed
Completed Step
Current Step
Not Done Yet
📄New Pipeline Stepinput.json
# Stage 1: Original Data Input
# No encryption applied yet - all sensitive data visible
input:
http_server:
address: "0.0.0.0:8080"
path: "/encrypt"
pipeline:
processors:
# Passthrough - no encryption yet
- mapping: |
root = this
output:
stdout: {}Try It Yourself
Ready to build this encryption pipeline? Follow the step-by-step tutorial:
Deep Dive into Each Pattern
Want to understand each encryption strategy in depth?
- Step 1: Payment Encryption - PCI-DSS compliant card data protection
- Step 2: PII Encryption - Personal identifier protection with analytics
- Step 3: Address Encryption - Location privacy with demographic preservation
- Step 4: Date Encryption - Temporal data protection with cohort analytics
- Step 5: Multi-Key Strategy - Risk-based key architecture
- Step 6: Production Operations - Key rotation, monitoring, and audit compliance
Next: Set up your environment to build this encryption pipeline yourself