You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
c2c-verification = "`Cluster-to-Cluster Sync Verification of Data Transfer <https://www.mongodb.com/docs/cluster-to-cluster-sync/current/reference/verification/>`__"
:alt: An image showing an example queryable encryption workflow.
124
+
125
+
Recommendations for Data Encryption
126
+
-----------------------------------
127
+
128
+
Consider the following security recommendations when
129
+
provisioning your {+clusters+}.
130
+
131
+
BYOK Encryption
64
132
~~~~~~~~~~~~~~~
65
133
66
-
For development and testing environments, do not enable added encryption with :ref:`your own encryption keys <security-kms-encryption>` through AWS Key Management Service (KMS), Google Cloud KMS, or Azure Key Vault. This saves costs in your
67
-
non-production environments.
68
-
69
-
For staging and production environments, enable added encryption with :ref:`your own encryption keys <security-kms-encryption>` through AWS Key Management Service (KMS), Google Cloud KMS, or Azure Key Vault for
70
-
additional security.
134
+
For staging and production environments, we recommend that you enable :ref:`BYOK
135
+
encryption <security-kms-encryption>` through AWS Key Management Service (KMS),
136
+
Google Cloud KMS, or Azure Key Vault when provisioning your {+clusters+}
137
+
to avoid relying on application development teams to configure it later on.
138
+
This also ensures consistent data protection across your environments.
139
+
140
+
For development and testing environments, consider skipping |byok| encryption
141
+
to save costs. However, if you're storing sensitive data in |service|,
142
+
such as for healthcare or financial services industries, consider enabling
143
+
|byok| encryption in development and testing environments as well.
144
+
145
+
Data Classification
146
+
~~~~~~~~~~~~~~~~~~~
147
+
148
+
During the provisioning process, we also recommend assessing the
149
+
sensitivity of certain fields in your data and classifying
150
+
them to determine which data requires encryption and what global
151
+
restrictions to apply to these groups.
152
+
153
+
Consider the following data classification levels as a guideline:
154
+
155
+
- **Public Data**: Data that represents little to no
156
+
risk to the company if unauthorized disclosure, alteration,
157
+
or destruction of data occurs. While confidentiality is
158
+
less of a concern, you should still apply authorization controls to
159
+
prevent unauthorized modification or destruction of public data.
160
+
161
+
Examples: Products, Brochures, Training Information
162
+
163
+
- **Private Data**: Data that represents a moderate
164
+
risk to the company if unauthorized disclosure, alteration,
165
+
or destruction of data occurs. By default, all
166
+
institutional data that is not explicitly classified as restricted or
167
+
public data should be treated as private data.
168
+
Apply CSFLE or queryable encryption on any fields that
0 commit comments