Queryable Encryption (original) (raw)

Queryable Encryption gives you the ability to perform the following tasks:

These tasks are all completed without the server having knowledge of the data it's processing.

Sensitive data is encrypted throughout its lifecycle - in-transit, at-rest, in-use, in logs, and backups - and only ever decrypted on the client-side, since only you have access to the encryption keys.

Queryable Encryption introduces an industry-first fast, searchable encryption scheme developed by the pioneers in encrypted search. The feature supports equality and range searches, with additional query types such as prefix, suffix, and substring planned for future releases.

You can set up Queryable Encryption using the following mechanisms:

When implementing an application that uses Queryable Encryption, consider the points listed in Security Considerations.

For other limitations, see Queryable Encryption limitations.

The following table shows which MongoDB server products support which Queryable Encryption mechanisms:

Product Name Supports Automatic Encryption Supports Explicit Encryption
MongoDB Atlas Yes Yes
MongoDB Enterprise Advanced Yes Yes
MongoDB Community Edition No Yes

To learn which MongoDB drivers support Queryable Encryption, seeQueryable Encryption Compatibility.

To learn about the security benefits of Queryable Encryption for your applications, see the Features page.

To learn what you must install to use Queryable Encryption, see the Installation Requirements page.

To start using Queryable Encryption, see the Quick Start.

To learn how Queryable Encryption works and how to set it up, see theFundamentals section.

The fundamentals section contains the following pages:

To learn how to perform specific tasks with Queryable Encryption, see theTutorials section.

To view information to help you develop your Queryable Encryption enabled applications, see the Reference section.

The reference section contains the following pages: