Encryption at rest protects your data on media. Data on media is “data at rest,” whereas data moving across a communications channel is known as “data in motion.” Increasing security risks and compliance requirements at times mandates the use of encryption at rest to prevent unauthorized access to data on disk.
Encryption at rest can be configured to encrypt data, log files, and configuration files separately. Encryption is only applied to newly-created files once encryption at rest is enabled, and does not apply to existing files without further action by the user. For existing data, a merge or re-index will trigger encryption of data, a configuration change will trigger encryption of configuration files, and log rotation will initiate log encryption.
MarkLogic 9.x supports any KMIP 1.2 compliant KMS system and also natively supports using an AWS KMS. The following technical material enumerates the procedure to set up, configure, and deploy Gemalto’s SafeNet KeySecure KMS appliance with MarkLogic.
The overall architecture looks like the following:
Note: To use encryption at rest with an external key management system (KMS), you must have an Advanced Security license key. For details on purchasing a license key for the Advanced Security features, contact your MarkLogic sales representative.
The following guidelines apply to all MarkLogic versions and should be completed on the SafeNet KeyServer, as per its Administration Guide.
The following steps should be done on each of the MarkLogic server instances that will have databases that will have Advanced Encryption enabled.
openssl genrsa -out kmip-key.pem 2048
openssl req -out "MLServer_hostname.csr" -key kmip-key.pem -new -sha256
openssl s_client -connect safenet-1.mydomain.com:9010 -CAfile kmip-CA.pem -cert kmip-cert.pem -key kmip-key.pem
Follow the instructions in Chapter 12 on External Security in the MarkLogic Administrator Guide to configure the rest of the External KMS Server settings for MarkLogic.
MarkLogic Server allows you to configure for users to be authenticated using an external authentication protocol. These external agents serve as centralized points of authentication or repositories for user information from which authorization decisions can be made. Here, we walked through a common key management solution, Gemalto’s SafeNet KeySecure KMS, and how to configure it appropriately.
By continuing to use this website you are giving consent to cookies being used in accordance with the MarkLogic Privacy Statement.