Our working model of application encryption will consist of reading data from the
HR schema, with sensitive columns being encrypted as they are transmitted across the network. Part of the responsibility falls to the application developers who must assure that sensitive data is only available to the client in encrypted form. Our application security schema,
appsec, can provide the tools, but our application developers, like
HR, will need to implement them.
Let's explore what
HR does to encrypt his data first. Then We'll look at what the Application Security manager can provide to all application developers as a template for implementing this.
HR, as provided by Oracle, ...