From 8def855876a4350898cb04d2debc782f94dc111b Mon Sep 17 00:00:00 2001 From: Santiago Bartesaghi Date: Sun, 12 Sep 2021 18:50:10 -0300 Subject: [PATCH] Fix link in ActiveRecord Encryption guides [ci skip] --- guides/source/active_record_encryption.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/guides/source/active_record_encryption.md b/guides/source/active_record_encryption.md index 73d1b37360..f7c2be6e4f 100644 --- a/guides/source/active_record_encryption.md +++ b/guides/source/active_record_encryption.md @@ -23,7 +23,7 @@ Active Record Encryption is meant to protect sensitive information in your appli As an immediate practical benefit, encrypting sensitive attributes adds an additional security layer. For example, if an attacker gained access to your database, a snapshot of it, or your application logs, they wouldn't be able to make sense of the encrypted information. And even without thinking about malicious actors, checking application logs for legit reasons shouldn't expose personal information from customers either. -But more importantly, by using Active Record Encryption, you define what constitutes sensitive information in your application at the code level. This enables controlling how this information is accessed and building services around it. As examples, think about auditable Rails consoles that protect encrypted data or check the built-in system to [filter controller params automatically](./#filtering-params-named-as-encrypted-columns). +But more importantly, by using Active Record Encryption, you define what constitutes sensitive information in your application at the code level. This enables controlling how this information is accessed and building services around it. As examples, think about auditable Rails consoles that protect encrypted data or check the built-in system to [filter controller params automatically](#filtering-params-named-as-encrypted-columns). ## Basic Usage