You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* (DOCSP-46857) Updates more images from design
* (DOCSP-46857) Updates more diagrams from design and moves the encryption section, updates shared descriptions
The following examples configure encryption with customer key management
205
+
using |service| :ref:`tools for automation <arch-center-automation>`.
206
+
207
+
Before you configure encryption with customer key management, you must
208
+
create your organizations, projects, and {+clusters+}. To learn more,
209
+
see :ref:`arch-center-create-hierarchy-example`.
210
+
211
+
Configure Encryption with Customer Key Management
212
+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
213
+
214
+
.. tabs::
215
+
216
+
.. tab:: Dev and Test Environments
217
+
:tabid: devtest
218
+
219
+
For your development and testing environments, consider skipping encryption
220
+
with customer key management to save costs, unless you're in a highly-regulated industry
221
+
or storing sensitive data. To learn more, see :ref:`arch-center-recommendations`.
222
+
223
+
.. tab:: Staging and Prod Environments
224
+
:tabid: stagingprod
225
+
226
+
For your staging and production environments environments, we
227
+
recommend that you enable encryption with customer key management when you provision your {+clusters+}.
228
+
To learn more, see :ref:`arch-center-recommendations`.
229
+
230
+
To enable encryption with customer key management with Terraform,
231
+
create the following resources. Change the IDs and names to use your values:
232
+
233
+
.. tabs::
234
+
235
+
.. tab:: AWS
236
+
:tabid: aws
237
+
238
+
.. tip::
239
+
240
+
For a complete configuration example, see
241
+
:github:`Atlas Terraform Provider Example <mongodb/terraform-provider-mongodbatlas/blob/master/examples/mongodbatlas_encryption_at_rest/aws/atlas-cluster>`.
242
+
243
+
Alternatively, to simplify the configuration process, you can use the
244
+
`encryption at rest Terraform module <https://registry.terraform.io/modules/terraform-mongodbatlas-modules/encryption-at-rest/mongodbatlas/latest>`__.
For your development and testing environments, consider skipping encryption
557
-
with customer key management to save costs, unless you're in a highly-regulated industry
558
-
or storing sensitive data. To learn more, see :ref:`arch-center-recommendations`.
559
-
560
-
.. tab:: Staging and Prod Environments
561
-
:tabid: stagingprod
562
-
563
-
For your staging and production environments environments, we
564
-
recommend that you enable encryption with customer key management when you provision your {+clusters+}.
565
-
To learn more, see :ref:`arch-center-recommendations`.
566
-
567
-
To enable encryption with customer key management with Terraform,
568
-
create the following resources. Change the IDs and names to use your values:
569
-
570
-
.. tabs::
571
-
572
-
.. tab:: AWS
573
-
:tabid: aws
574
-
575
-
.. tip::
576
-
577
-
For a complete configuration example, see
578
-
:github:`Atlas Terraform Provider Example <mongodb/terraform-provider-mongodbatlas/blob/master/examples/mongodbatlas_encryption_at_rest/aws/atlas-cluster>`.
579
-
580
-
Alternatively, to simplify the configuration process, you can use the
581
-
`encryption at rest Terraform module <https://registry.terraform.io/modules/terraform-mongodbatlas-modules/encryption-at-rest/mongodbatlas/latest>`__.
0 commit comments