Skip to content

Commit abff7c4

Browse files
authored
(DOCSP-45917) Revises per explicit edits from v1 review. (#55)
* (DOCSP-45917) Revises per explicit edits from v1 review. * Revises per copy review.
1 parent d98500b commit abff7c4

File tree

1 file changed

+24
-13
lines changed

1 file changed

+24
-13
lines changed

source/compliance.txt

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ those specific to highly-regulated industries.
4747
several other certifications. The full list of certifications is included
4848
in this section.
4949

50-
These certifications serve as a foundation for meeting industry-specific
51-
regulatory requirements. Use these certifications to maintain security controls
52-
and ensure that your data practices align with necessary compliance demands.
50+
These certifications mean you can configure {+service+} to comply with a
51+
particular standard. Be sure to follow the recommended settings for the
52+
standard to ensure compliance.
5353

5454
{+service+} maintains the following certifications:
5555

@@ -74,14 +74,18 @@ Encryption
7474
~~~~~~~~~~
7575

7676
You can implement encryption to ensure data security and compliance across all
77-
stages of data handling.
77+
stages of data handling. Encryption is one of the most common requirements for
78+
ensuring compliance with certain standards and {+service+} offers a robust set
79+
of encryption options to satisfy the requirements.
7880

7981
- By default, |service| encrypts data in transit. To ensure data privacy and
8082
regulatory compliance, |service| requires |tls-ssl| to encrypt the connections
8183
to your databases. In addition, you can configure SSL or TLS OCSP certificate
82-
revocation checking. To learn more, see :atlas:`OCSP Certificate Revocation Check <oscp-cert-check>`.
84+
revocation checking. To learn more, see `OCSP Certificate Revocation Check <https://www.mongodb.com/docs/atlas/setup-cluster-security/#std-label-oscp-cert-check>`__.
8385

84-
- By default, |service| encrypts all data at rest. |service| uses |AES-256|
86+
- By default, |service| encrypts all data at rest using
87+
`cloud provider disk encryption <https://www.mongodb.com/docs/atlas/security-kms-encryption/>`__.
88+
|service| uses |AES-256|
8589
encryption to encrypt all data stored in |s3| buckets in your |service|
8690
{+database-deployments+}.
8791
In addition, |service| supports using |aws| |kms|, |akv|, and |gcp| to
@@ -90,7 +94,8 @@ stages of data handling.
9094
<security-kms-encryption>`.
9195

9296
- You can use :manual:`queryable encryption </core/queryable-encryption/>`
93-
to secure queries on encrypted data. With queryable encryption, sensitive
97+
to secure queries on encrypted data on select, sensitive fields
98+
in a document stored on MongoDB. With queryable encryption, sensitive
9499
information remains protected even when users run queries on data.
95100

96101
Use well-researched non-deterministic encryption schemes to maintain
@@ -100,14 +105,15 @@ stages of data handling.
100105

101106
- Encrypt sensitive data fields from the client-side.
102107
- Store sensitive data fields as fully randomized encrypted data on the database
103-
server-side.
108+
{+cluster+}-side, run with {+service+}.
104109
- Run expressive queries on the encrypted data. Choose encryption configurations
105110
that support expressive queries on the encrypted data.
106111

107112
MongoDB completes these tasks without the server having knowledge of the data
108113
it's processing.
109114

110-
Sensitive data is encrypted throughout its lifecycle, in-transit, at-rest, in-use,
115+
When using queryable encryption, sensitive data is encrypted throughout its
116+
lifecycle: in transit, at rest, in use,
111117
in logs, and backups. The data is only ever decrypted on the client-side,
112118
since only you have access to the encryption keys.
113119

@@ -126,8 +132,13 @@ stages of data handling.
126132
Data Sovereignty
127133
~~~~~~~~~~~~~~~~
128134

129-
{+service+} simplifies data sovereignty compliance through global {+clusters+}
130-
with zoned sharding.
135+
{+service+} supports over 110+ regions across |aws|, |azure|, and |gcp|.
136+
This global distribution of supported locations ensures that you can
137+
provision clusters and store data that complies with your data sovereignty
138+
and compliance requirements. Understanding the data sovereignty requirements
139+
for any application being built on {+service+} is necessary to ensure you
140+
stay compliant with proper governance. Additionally, {+service+} simplifies
141+
data sovereignty compliance through global {+clusters+} with zoned sharding.
131142

132143
You can use global {+clusters+} to control data storage locations. You can
133144
partition and store data in your database into distinct zones, each situated
@@ -144,8 +155,8 @@ Backup Snapshot Distribution
144155

145156
You can distribute backup snapshots and oplog data across multiple regions.
146157
For example, you can satisfy compliance requirements and store backups in
147-
different, air-gapped geographical locations to ensure disaster recovery
148-
in case of regional outages. To learn more, see :atlas:`Snapshot Distribution <snapshot-distribution>`.
158+
different geographical locations to ensure disaster recovery
159+
in case of regional outages. To learn more, see `Snapshot Distribution <https://www.mongodb.com/docs/atlas/backup/cloud-backup/snapshot-distribution/>`__.
149160

150161
.. _arch-center-compliance-backup-compliance-policy:
151162

0 commit comments

Comments
 (0)