As a C/AL developer, you want to protect sensitive data which already exists in a system, but it is not clear which data needs protection and how to store it.
As a C/AL developer, you want to protect sensitive data which already exists in a system, but it is not clear which data needs protection and how to store it.