You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/compliance.txt
+24-13Lines changed: 24 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -47,9 +47,9 @@ those specific to highly-regulated industries.
47
47
several other certifications. The full list of certifications is included
48
48
in this section.
49
49
50
-
These certifications serve as a foundation for meeting industry-specific
51
-
regulatory requirements. Use these certifications to maintain security controls
52
-
and ensure that your data practices align with necessary compliance demands.
50
+
These certifications mean you can configure {+service+} to comply with a
51
+
particular standard. Be sure to follow the recommended settings for the
52
+
standard to ensure compliance.
53
53
54
54
{+service+} maintains the following certifications:
55
55
@@ -74,14 +74,18 @@ Encryption
74
74
~~~~~~~~~~
75
75
76
76
You can implement encryption to ensure data security and compliance across all
77
-
stages of data handling.
77
+
stages of data handling. Encryption is one of the most common requirements for
78
+
ensuring compliance with certain standards and {+service+} offers a robust set
79
+
of encryption options to satisfy the requirements.
78
80
79
81
- By default, |service| encrypts data in transit. To ensure data privacy and
80
82
regulatory compliance, |service| requires |tls-ssl| to encrypt the connections
81
83
to your databases. In addition, you can configure SSL or TLS OCSP certificate
82
-
revocation checking. To learn more, see :atlas:`OCSP Certificate Revocation Check <oscp-cert-check>`.
84
+
revocation checking. To learn more, see `OCSP Certificate Revocation Check <https://www.mongodb.com/docs/atlas/setup-cluster-security/#std-label-oscp-cert-check>`__.
83
85
84
-
- By default, |service| encrypts all data at rest. |service| uses |AES-256|
86
+
- By default, |service| encrypts all data at rest using
87
+
`cloud provider disk encryption <https://www.mongodb.com/docs/atlas/security-kms-encryption/>`__.
88
+
|service| uses |AES-256|
85
89
encryption to encrypt all data stored in |s3| buckets in your |service|
86
90
{+database-deployments+}.
87
91
In addition, |service| supports using |aws| |kms|, |akv|, and |gcp| to
@@ -90,7 +94,8 @@ stages of data handling.
90
94
<security-kms-encryption>`.
91
95
92
96
- You can use :manual:`queryable encryption </core/queryable-encryption/>`
93
-
to secure queries on encrypted data. With queryable encryption, sensitive
97
+
to secure queries on encrypted data on select, sensitive fields
98
+
in a document stored on MongoDB. With queryable encryption, sensitive
94
99
information remains protected even when users run queries on data.
95
100
96
101
Use well-researched non-deterministic encryption schemes to maintain
@@ -100,14 +105,15 @@ stages of data handling.
100
105
101
106
- Encrypt sensitive data fields from the client-side.
102
107
- Store sensitive data fields as fully randomized encrypted data on the database
103
-
server-side.
108
+
{+cluster+}-side, run with {+service+}.
104
109
- Run expressive queries on the encrypted data. Choose encryption configurations
105
110
that support expressive queries on the encrypted data.
106
111
107
112
MongoDB completes these tasks without the server having knowledge of the data
108
113
it's processing.
109
114
110
-
Sensitive data is encrypted throughout its lifecycle, in-transit, at-rest, in-use,
115
+
When using queryable encryption, sensitive data is encrypted throughout its
116
+
lifecycle: in transit, at rest, in use,
111
117
in logs, and backups. The data is only ever decrypted on the client-side,
112
118
since only you have access to the encryption keys.
113
119
@@ -126,8 +132,13 @@ stages of data handling.
126
132
Data Sovereignty
127
133
~~~~~~~~~~~~~~~~
128
134
129
-
{+service+} simplifies data sovereignty compliance through global {+clusters+}
130
-
with zoned sharding.
135
+
{+service+} supports over 110+ regions across |aws|, |azure|, and |gcp|.
136
+
This global distribution of supported locations ensures that you can
137
+
provision clusters and store data that complies with your data sovereignty
138
+
and compliance requirements. Understanding the data sovereignty requirements
139
+
for any application being built on {+service+} is necessary to ensure you
140
+
stay compliant with proper governance. Additionally, {+service+} simplifies
141
+
data sovereignty compliance through global {+clusters+} with zoned sharding.
131
142
132
143
You can use global {+clusters+} to control data storage locations. You can
133
144
partition and store data in your database into distinct zones, each situated
@@ -144,8 +155,8 @@ Backup Snapshot Distribution
144
155
145
156
You can distribute backup snapshots and oplog data across multiple regions.
146
157
For example, you can satisfy compliance requirements and store backups in
147
-
different, air-gapped geographical locations to ensure disaster recovery
148
-
in case of regional outages. To learn more, see :atlas:`Snapshot Distribution <snapshot-distribution>`.
158
+
different geographical locations to ensure disaster recovery
159
+
in case of regional outages. To learn more, see `Snapshot Distribution <https://www.mongodb.com/docs/atlas/backup/cloud-backup/snapshot-distribution/>`__.
0 commit comments