Skip to content

Commit d98500b

Browse files
authored
(DOCSP-45910) Revises per explicit edits from v1 review. (#54)
1 parent d274dcd commit d98500b

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

source/data-encryption.txt

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,16 +23,18 @@ Features
2323
Encryption in Transit
2424
`````````````````````
2525

26-
Encryption in transit secures data during transmission between clients and servers, preventing unauthorized access or tampering.
27-
In |service|, all network traffic to {+clusters+} is protected by Transport Layer Security (TLS), which is enabled by default and cannot be disabled.
26+
Encryption in transit secures data during transmission between clients and servers,
27+
ensuring that your data cannot be inspected while in motion.
28+
In |service|, all network traffic to {+clusters+} is protected by Transport Layer
29+
Security (TLS) 1.2+, which is enabled by default and cannot be disabled.
2830
Data transmitted to and between nodes is encrypted in transit using TLS, ensuring secure communication throughout.
2931

3032
Encryption at Rest
3133
``````````````````
3234

3335
Encryption at rest ensures that all data on disk are encrypted.
3436
In |service|, customer data is automatically encrypted at rest.
35-
This process utilizes your cloud provider's disk encryption, with the provider managing the encryption keys.
37+
This process utilizes your cloud provider's disk encryption, with the provider managing the encryption keys. This process cannot be disabled.
3638
Additionally, you have the option to enable database-level encryption, allowing you to use :ref:`your own encryption keys <security-kms-encryption>`
3739
with AWS Key Management Service (KMS), Google Cloud KMS, or Azure Key Vault.
3840

0 commit comments

Comments
 (0)