Queryable Encryption
Introduction
Queryable Encryption gives you the ability to perform the following tasks:
Encrypt sensitive data fields from the client-side.
Store sensitive data fields as fully randomized encrypted data on the database server-side.
Run expressive queries on the encrypted data.
These tasks are all completed without the server having knowledge of the data it's processing.
Sensitive data is encrypted throughout its lifecycle - in-transit, at-rest, in-use, in logs, and backups - and only ever decrypted on the client-side, since only you have access to the encryption keys.
Queryable Encryption introduces an industry-first fast, searchable encryption scheme developed by the pioneers in encrypted search. The feature supports equality searches, with additional query types such as range, prefix, suffix, and substring planned for future releases.
You can set up Queryable Encryption using the following mechanisms:
Automatic Encryption: Enables you to perform encrypted read and write operations without you having to write code to specify how to encrypt fields.
Explicit Encryption: Enables you to perform encrypted read and write operations through your MongoDB driver's encryption library. You must specify the logic for encryption with this library throughout your application.
The following table shows which MongoDB server products support which Queryable Encryption mechanisms:
Product Name | Supports Automatic Encryption | Supports Explicit Encryption |
---|---|---|
MongoDB Atlas | Yes | Yes |
MongoDB Enterprise Advanced | Yes | Yes |
MongoDB Community Edition | No | Yes |
To learn which MongoDB drivers support Queryable Encryption, see Compatibility.
Features
To learn about the security benefits of Queryable Encryption for your applications, see the Features page.
Install
To learn what you must install to use Queryable Encryption, see the Installation Requirements page.
Quick Start
To start using Queryable Encryption, see the Quick Start.
Fundamentals
To learn how Queryable Encryption works and how to set it up, see the Fundamentals section.
The fundamentals section contains the following pages:
Tutorials
To learn how to perform specific tasks with Queryable Encryption, see the Tutorials section.
Reference
To view information to help you develop your Queryable Encryption enabled applications, see the Reference section.
The reference section contains the following pages: