Setting Data Encryption

Setting Data Encryption

Data encryption is a way to safeguard personal or sensitive information like credit card details, backup phone numbers, personal identification numbers etc. that are stored in your CRM database. It prevents the data from being stolen or lost by converting the plain (or readable) text into cipher (or non-readable) text that is accessible only to the authorized parties. Even if a potential hacker gets a hold of the data, the information stored in the cipher text is non-readable.  

In Zoho CRM you can encrypt custom fields using AES. Encrypting the data does not come in the way of the effective and quick use of Zoho CRM, by authorized users.

Availability 
Permission Required
Users with the Administrator profile can access this feature.
Check Feature Availability and Limits 

Feature Specifications

Field and Module-based specifications

  1. Only Custom fields (new and existing) can be encrypted. Once a field is marked as Unique, it cannot be encrypted. Similarly, once a field is encrypted you cannot mark it as Unique. 
  2. Fields that can be encrypted are Single Line, Email, Phone, Number, Multi line (small), Date, Date-Time, Currency, Decimal, Long Integer, and URL fields.
  3. Data encryption is available for all standard (except Tasks, Calls, and Meetings) and custom modules. 
  4. Encryption can be disabled for a field at any time.
  5. In Lead Conversion Mapping, data can be converted and stored only between two encrypted fields.
  6. Encrypted fields can be used as inputs in Formula fields.

Handling encrypted data

  1. Find & Merge and Deduplication  are supported for encrypted fields.
  2. Any data imported to encrypted fields will be encrypted by default and exported data are decrypted.
  3. Encrypted fields can be included in Web forms.
  4. Encrypted field can be displayed in Reports  as a column, but cannot be used in Criteria and Columns to Total.
  5. Encrypted fields can be used as inputs in custom functions, and as merge fields in templates.
  6. APIs  are supported for encrypted data.
  7. Encrypted fields can be used in integrations too. Utilizing the information in integrations are entirely at the user's risk.

Limitations and Trade-offs

  1. Only full-text search is supported in global search. For instance, if the encrypted data is "Joseph Wells," the encrypted field record does not show in the results of a search for "Joseph."
  2. Encrypted fields cannot be used in Advanced Filters
  3. Encrypted fields cannot be found using Search by Criteria
  4. Encrypted fields are not visible in Sort option.
  5. Encrypted information is only stored in the crm.zoho.com domain. Use the encrypted information in other domains or third-party services at your own discretion.
  6. In the  Forecasts  module, encrypted fields cannot be used as  Target Fields.
  7. When a field is encrypted, the following operators will be supported in the criteria: 
    1. Single line, Phone, Email, Small multi-line (character limit of 2000), Date, Date-Time, and Currency - is empty and is not empty
    2. Number, Decimal, Long integer - =, !=, is empty, and is not empty. 
File encryption: All the attachments are encrypted by default once added to CRM. 


Email encryption: Emails sent and received via CRM will be encrypted at rest.


Read more about how data encryption takes place at Zoho.

To encrypt/decrypt custom fields:

  1. Go to  Setup > Customization > Modules and Fields > [Select the module] .
  2. In the module layout editor, go to the field you wish to encrypt, click the  Settings icon  and select  Edit Properties.
      

  3. In the  Field Properties  popup, select the  Encrypt Field  checkbox.
      

  4. Click  Done.
  5. Save  the layout.

Encryption Process at Zoho CRM 

 Encryption can be used in two situations.

  1. Encryption in Transit
  2. Encryption at Rest (EAR)

Encryption in Transit

Refers to data that is encrypted when it is in transit — including from your browser to the web server and other third parties via integrations.
Encrypting data in transit protects your data from man-in-the-middle-attacks. Read more.


Encryption at Rest
Refers to data that is encrypted when it is stored (not moving) — either on a disc, in a database, or some other form of media. In addition to encryption of data during transit, encryption of data when it is stored in the servers provides an even higher level of security. EAR protects against any  possible data leak due to server compromise or unauthorized access.
Encryption is done at the application layer using the AES-256 algorithm which is a symmetric encryption algorithm and uses 128-bit blocks and 256-bit keys. The key used to convert the data from plain text to cipher text is called Data Encryption Key(DEK). The DEK is further encrypted using the KEK (Key Encryption Key),
thus, providing yet another layer of security. The keys are generated and maintained by our in-house Key Management Service (KMS). Read more.

Full-disk Encryption
Full disk encryption is available at IN (India), AU (Australia), and JP (Japan) data centers and upon request we extend the facility to other DCs. Read more