This document discusses data obfuscation techniques in Splunk Enterprise, including anonymization and pseudonymization. It covers securing data in flight using encryption and authentication. For data at rest, it discusses integrity controls and encryption using OS, devices, or Vormetric. It then details how Splunk supports anonymization through SEDCMD transforms or at search time. Pseudonymization techniques include hashing or duplicating data to different indexes. The document demonstrates modular inputs and a custom data handler to encrypt and anonymize fields before indexing.