๐ป Get started: MongoDB Cluster Infrastructure and Cryptographic Security ๐ป
Danny Chan
Posted on August 6, 2024
๐ Considerations for Managing Data Security:
- Compliance and privacy regulations ๐
- Penalties: Leaders fully aware of costs for storing and managing data ๐ฐ
- Scalability: Grow in the future, demand requires ๐
- Legacy Infrastructure: Easily comply with data regulations ๐จโ๐ป
- Flexibility: Meet regulations, grow in breadth and complexity ๐ง
- Cost: Manual processes, noncompliance ๐ธ
๐ Zones in Sharded Clusters:
- Sharding to deploy large data sets ๐
- Create zones of sharded data based on the shard key ๐บ๏ธ
๐ Network Isolation and Access:
- Virtual private cloud (VPC) ๐ก๏ธ
- Isolating data, systems ๐
- Highly available within each region โ๏ธ
- Each shard of data will have multiple nodes ๐ป
- Automatically and transparently failover for zero downtime โ ๏ธ
๐ Multi-Cloud Clusters:
- AWS, Microsoft Azure, Google Cloud ๐
- Define a geographic location for each document ๐
- Keep relevant data close to end users for regulatory compliance ๐
๐ IP Whitelists:
- Allow to specify a specific range of IP addresses to access ๐
- Granular control over data ๐
๐ Queryable Encryption:
- Encryption of sensitive data from client side, stored as fully randomized ๐
- Without sacrificing performance ๐
๐ MongoDB Atlas Global Clusters:
- Control data deployment to specific geographical regions for fulfilling data policies and compliance ๐
๐ Client-side Field-level Encryption:
- Protect data while being transmitted, at rest and in use ๐
- Database never sees plaintext, but data remains queryable ๐
- Privacy regulations (GDPR, CCPA, PII) ๐
- Make data unreadable, unrecoverable: in memory, at rest, in backups, in logs ๐
๐ KMIP: Cryptographic Operations ๐
- Defines how key management operations and data exchange between client and servers ๐
- Supports any KMIP-enabled key provider (e.g., AWS, Google Cloud, Azure) ๐
- Allows the use of custom in-house key management software ๐ป
๐ Encrypted Data Example: ๐
- MongoDB driver requests key from KMIP key provider (e.g., AWS) ๐
- Driver uses the key to encrypt the SSN number ๐
- Driver submits the query to the database with the encrypted SSN number as ciphertext ๐
- Database returns the encrypted query results to the driver ๐
- Driver decrypts the query results using the keys ๐
๐ Encrypted Data Advantages: ๐
- Reduces the risk of unauthorized access ๐ซ
- Reduces the risk of sensitive data disclosure ๐ซ
- Data is encrypted before leaving the application ๐
- Protects data over the network, in database memory, at rest in storage and backups, and in system logs ๐
๐ MongoDB Segmenting Data by Location with Sharded Clusters: ๐
Challenges:
- CPU and/or memory becomes overloaded ๐ฅ
- Cannot respond to request traffic ๐ฆ
- Increase in database response time ๐ฐ๏ธ
- Out of storage ๐ฝ
- Network interface is overloaded ๐
Solution: Sharding ๐ง
- Horizontal scaling ๐
- Additional database nodes (replicas) to share request traffic ๐ป
- Distributed across nodes in different regions for a balanced cluster ๐
- Create zones of sharded data based on the shard key ๐บ๏ธ
- Associate each zone with one or more shards in the cluster ๐
Sharding Details:
- If additional database nodes go down, other nodes (replicas) can still serve read & write operations ๐
- If additional database nodes go down, other nodes (replicas) can only serve read operations ๐
Reference:
https://www.mongodb.com/library/mainframe-modernization/reference-architecture-mainframe-modernization?lb-mode=overlay
Reference Architecture: Mainframe Modernization
https://www.mongodb.com/solutions/solutions-library
Solutions Library
Editor
Danny Chan, specialty of FSI and Serverless
Kenny Chan, specialty of FSI and Machine Learning
Posted on August 6, 2024
Join Our Newsletter. No Spam, Only the good stuff.
Sign up to receive the latest update from our blog.
Related
August 6, 2024