Question
HCL
AU
Last activity: 26 Jul 2018 1:40 EDT
Understanding the algorithm used behind the BLOB concept
As part of our application design, we are storing customer data (for one hour) in a single table under BLOB column to reduce the DB hits and to improve the performance.
Recently we got below questions from my security team to understand on BLOB,
- How secure is BLOB
- What is the logic/algorithm used behind BLOB concept.
_ BLOB column data can be extracted by any tools apart from PEGA.
- How are encryption keys managed (how are they protected and where do they live)?
Thanks,
Gopi
***Moderator Edit: Vidyaranjan | Updated SR details***