What Is Data In-Use Encryption?
FAQs
Data in use encryption protects sensitive data while it is actively being processed by applications. Instead of exposing plaintext data in memory or CPU registers, secure computing techniques allow systems to process encrypted data or restrict access to protected execution environments.
Traditional encryption protects data when it is stored or transmitted, but data is often decrypted while it is being processed. Data in use encryption reduces the risk of exposure during processing, helping organizations protect sensitive information from memory attacks, insider threats, or compromised systems.
Several technologies enable secure processing of sensitive data, including trusted execution environments (TEEs), memory encryption, homomorphic encryption, and secure multiparty computation. These approaches allow systems to perform operations on protected data without exposing plaintext values.
Some modern databases implement advanced encryption capabilities that allow applications to query encrypted data while limiting exposure of sensitive values. For example, queryable encryption allows applications to perform queries on encrypted fields while maintaining strong data protection controls.
Get started with Atlas today
- 125+ regions worldwide
- Sample data sets
- Always-on authentication
- End-to-end encryption
- Command line tools