Microsoft Entra now supports granular encryption at the individual field level, not just at rest or in transit. This means sensitive identifiers—like social security numbers, credit card data, or personal health information—can be encrypted separately from other fields within the same record. Even if an attacker gains database access, the protected fields remain unreadable without the right keys.
Field-level encryption in Microsoft Entra integrates with its identity and access management tools. Keys are managed through Entra's secure key vault or external key management systems. Access policies define which services, applications, or users can decrypt specific fields. This allows fine control over exposure without compromising application performance.
Implementation starts with defining the encryption scheme in your data model. Map each field requiring encryption, choose the algorithm (e.g., AES-256), and link it to a dedicated key. Microsoft Entra enforces strict separation of keys per field, which stops key reuse vulnerabilities. The encryption process can be handled by APIs or SDKs that call Entra services before data is written, and decryption happens only when strictly necessary.