Documentation | Securing workflows > Protecting sensitive data