๐Ÿ’ป Get started: MongoDB Cluster Infrastructure and Cryptographic Security ๐Ÿ’ป

danc

Danny Chan

Posted on August 6, 2024

๐Ÿ’ป Get started: MongoDB Cluster Infrastructure and Cryptographic Security ๐Ÿ’ป

๐Ÿ”’ Considerations for Managing Data Security:

  • Compliance and privacy regulations ๐Ÿ”
  • Penalties: Leaders fully aware of costs for storing and managing data ๐Ÿ’ฐ
  • Scalability: Grow in the future, demand requires ๐Ÿš€
  • Legacy Infrastructure: Easily comply with data regulations ๐Ÿ‘จโ€๐Ÿ’ป
  • Flexibility: Meet regulations, grow in breadth and complexity ๐Ÿง 
  • Cost: Manual processes, noncompliance ๐Ÿ’ธ


๐ŸŒ Zones in Sharded Clusters:

  • Sharding to deploy large data sets ๐Ÿ“Š
  • Create zones of sharded data based on the shard key ๐Ÿ—บ๏ธ


๐Ÿ” Network Isolation and Access:

  • Virtual private cloud (VPC) ๐Ÿ›ก๏ธ
  • Isolating data, systems ๐Ÿ”’
  • Highly available within each region โ†”๏ธ
  • Each shard of data will have multiple nodes ๐Ÿ’ป
  • Automatically and transparently failover for zero downtime โš ๏ธ


๐ŸŒ Multi-Cloud Clusters:

  • AWS, Microsoft Azure, Google Cloud ๐ŸŒ
  • Define a geographic location for each document ๐Ÿ“
  • Keep relevant data close to end users for regulatory compliance ๐ŸŒ


๐Ÿ”’ IP Whitelists:

  • Allow to specify a specific range of IP addresses to access ๐Ÿ”
  • Granular control over data ๐Ÿ”


๐Ÿ”’ Queryable Encryption:

  • Encryption of sensitive data from client side, stored as fully randomized ๐Ÿ”
  • Without sacrificing performance ๐Ÿš€


๐ŸŒ MongoDB Atlas Global Clusters:

  • Control data deployment to specific geographical regions for fulfilling data policies and compliance ๐ŸŒ


๐Ÿ”’ Client-side Field-level Encryption:

  • Protect data while being transmitted, at rest and in use ๐Ÿ”’
  • Database never sees plaintext, but data remains queryable ๐Ÿ”
  • Privacy regulations (GDPR, CCPA, PII) ๐ŸŒ
  • Make data unreadable, unrecoverable: in memory, at rest, in backups, in logs ๐Ÿ”’


๐Ÿ”’ KMIP: Cryptographic Operations ๐Ÿ”’

  • Defines how key management operations and data exchange between client and servers ๐Ÿ”‘
  • Supports any KMIP-enabled key provider (e.g., AWS, Google Cloud, Azure) ๐ŸŒ
  • Allows the use of custom in-house key management software ๐Ÿ’ป


๐Ÿ”’ Encrypted Data Example: ๐Ÿ”’

  1. MongoDB driver requests key from KMIP key provider (e.g., AWS) ๐Ÿ”‘
  2. Driver uses the key to encrypt the SSN number ๐Ÿ”’
  3. Driver submits the query to the database with the encrypted SSN number as ciphertext ๐Ÿ”’
  4. Database returns the encrypted query results to the driver ๐Ÿ”’
  5. Driver decrypts the query results using the keys ๐Ÿ”“


๐Ÿ”’ Encrypted Data Advantages: ๐Ÿ”’

  • Reduces the risk of unauthorized access ๐Ÿšซ
  • Reduces the risk of sensitive data disclosure ๐Ÿšซ
  • Data is encrypted before leaving the application ๐Ÿ”’
  • Protects data over the network, in database memory, at rest in storage and backups, and in system logs ๐Ÿ”’



๐ŸŒ MongoDB Segmenting Data by Location with Sharded Clusters: ๐ŸŒ



Challenges:

  • CPU and/or memory becomes overloaded ๐Ÿ”ฅ
  • Cannot respond to request traffic ๐Ÿšฆ
  • Increase in database response time ๐Ÿ•ฐ๏ธ
  • Out of storage ๐Ÿ’ฝ
  • Network interface is overloaded ๐ŸŒ


Solution: Sharding ๐Ÿ”ง

  • Horizontal scaling ๐Ÿš€
  • Additional database nodes (replicas) to share request traffic ๐Ÿ’ป
  • Distributed across nodes in different regions for a balanced cluster ๐ŸŒ
  • Create zones of sharded data based on the shard key ๐Ÿ—บ๏ธ
  • Associate each zone with one or more shards in the cluster ๐Ÿ”—


Sharding Details:

  • If additional database nodes go down, other nodes (replicas) can still serve read & write operations ๐Ÿ”
  • If additional database nodes go down, other nodes (replicas) can only serve read operations ๐Ÿ“–



Reference:

https://www.mongodb.com/library/mainframe-modernization/reference-architecture-mainframe-modernization?lb-mode=overlay
Reference Architecture: Mainframe Modernization

https://www.mongodb.com/solutions/solutions-library
Solutions Library


Editor

Image description

Danny Chan, specialty of FSI and Serverless

Image description

Kenny Chan, specialty of FSI and Machine Learning

๐Ÿ’– ๐Ÿ’ช ๐Ÿ™… ๐Ÿšฉ
danc
Danny Chan

Posted on August 6, 2024

Join Our Newsletter. No Spam, Only the good stuff.

Sign up to receive the latest update from our blog.

Related

ยฉ TheLazy.dev

About