MongoDB was designed to ensure data security and offers a number of protection technologies including robust authentication, role-based access control, encrypted communications, and strong auditing capabilities. CypherTrust Data Security Products supplement these MongoDB encryption measures to achieve true security against breaches.
Privileged User Access
Privileged users are those granted substantial access to corporate network resources to be able to perform their routine duties. But if these users are malicious, or if their credentials are stolen, it can lead to a major data breach.
Data-Base Bypass Attacks
Another dangerous data security attack bypasses the database and targets the data at rest in underlying servers or physical storage. These frequently include the organization’s unstructured files and structured databases, query reports, log files and other data sets that might contain sensitive or regulated information.
Thales high-performance encryption complements MongoDB security. CypherTrust Transparent Encryption protects the environment at the OS and file system level with encryption, access controls, and security intelligence information required for compliance and protection from malicious insiders and advanced malware, such as advanced persistent threats (APTs). Thales CypherTrust Application Encryption enables developers to easily build encryption for individual fields (such as social security numbers and credit cards) that are not critical to analysis but are a required component of reports and output into the MongoDB environment.
Integrated Key Management
CypherTrust Manager secures and manages encryption keys in the MongoDB environment.
Privileged User Access Control
The Thales CypherTrust Manager can enforce strong separation of duties by requiring the assignment of key and policy management to more than one data security administrator. In this manner, no one person has complete control over security activities, encryption keys, or administration. In addition, the CypherTrust Manager supports two-factor authentication for administrative access.
Scalable and Flexible
Unlike other solutions, this extensible platform is tunable to protect data as granular as specific columns within a relational database or fields within a document in MongoDB. On the other hand, it can protect all the data within a given directory or volume.
Compatible with Most Operating Systems and Highly Efficient
The platform supports the broadest range of operating systems and environments in the industry and delivers operational efficiencies through high-performance and centralized management with the CypherTrust Manager.