An email address leaks in a production log. That’s all it takes for compliance risk, privacy violation, and security debt to explode. Infrastructure as a Service (IaaS) teams often overlook this simple vector: logs are raw, unfiltered streams that capture request headers, payloads, and user data. Without masking, every