Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Sensitive Data

Any information that requires protection due to the risk of harm from its unauthorized disclosure, modification, or loss.

Sensitive data is any information whose unauthorized access, disclosure, alteration, or destruction could cause harm to individuals, organizations, or systems. This includes personal identifiable information (PII) like names and social security numbers, financial data like credit card numbers, authentication credentials, health records, proprietary business data, and any information subject to regulatory protection requirements.

How It Works

Protecting sensitive data requires understanding where it exists, how it flows, and who can access it throughout its lifecycle. Data at rest, stored in databases, files, and backups, must be encrypted and access-controlled. Data in transit, moving between client and server or between services, must be protected using TLS encryption. Data in use, actively being processed in application memory, requires careful handling to prevent exposure through logging, error messages, or memory dumps.

Classification is the first step in data protection. Not all data requires the same level of protection, and treating everything as equally sensitive wastes resources while failing to adequately protect the most critical information. Organizations typically define classification tiers, public, internal, confidential, and restricted, each with specific handling requirements. Credit card numbers and authentication tokens require stronger controls than marketing content.

Common exposure vectors include logging sensitive values in application or server logs, returning excessive data in API responses, storing unencrypted data in client-side storage, transmitting data over unencrypted connections, including sensitive information in URLs where it appears in browser history and server logs, and failing to properly redact data in error messages and stack traces. Each of these represents a point where properly classified data can escape its intended protection boundaries.

Why It Matters

Sensitive data exposure is a pervasive issue in security assessments and a leading cause of regulatory penalties under frameworks like GDPR, HIPAA, and PCI DSS. The consequences of exposure range from identity theft and financial fraud for individuals to regulatory fines, litigation, and reputational damage for organizations. Identifying all locations where sensitive data is stored, processed, and transmitted, and ensuring appropriate protections at each point, is a fundamental requirement of any security program.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment