{"id":16313,"date":"2024-09-18T15:25:43","date_gmt":"2024-09-18T22:25:43","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=16313"},"modified":"2025-06-13T21:54:22","modified_gmt":"2025-06-14T04:54:22","slug":"data-security-capella-columnar-rbac","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/data-security-capella-columnar-rbac\/","title":{"rendered":"Capella Columnar RBAC: Garantizar la seguridad de los datos y el acceso controlado"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Controlar qui\u00e9n puede hacer qu\u00e9 en su aplicaci\u00f3n es crucial, y en muchos casos no todo el mundo debe tener los mismos permisos o capacidades en la aplicaci\u00f3n, ya que esto puede dar lugar a riesgos de seguridad e ineficiencias operativas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En este blog, mostramos un par de t\u00e9cnicas para restringir el acceso a la funcionalidad de la aplicaci\u00f3n en funci\u00f3n del usuario que la utiliza.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Existen dos tipos principales de restricciones en Capella Columnar:<\/span><\/p>\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/docs.couchbase.com\/columnar\/admin\/auth\/auth-ui.html\"><span style=\"font-weight: 400;\">Restringir el acceso a la interfaz de usuario de Columnar<\/span><\/a><span style=\"font-weight: 400;\">: El acceso a la interfaz de usuario (UI) se controla asignando funciones espec\u00edficas a los usuarios. Esto garantiza que solo el personal autorizado pueda interactuar con la interfaz de usuario.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><a href=\"https:\/\/docs.couchbase.com\/columnar\/admin\/auth\/auth-data.html\"><span style=\"font-weight: 400;\">Definici\u00f3n de funciones y acceso a herramientas externas:<\/span><\/a><span style=\"font-weight: 400;\"> Adem\u00e1s del acceso a la interfaz de usuario, Capella Columnar permite definir funciones y permisos de acceso para diversas herramientas externas, como herramientas de BI y API REST. Este control de grano fino ayuda a asegurar sus datos y garantiza que cada usuario tiene los permisos necesarios para realizar sus tareas sin sobrepasar los l\u00edmites.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Comprendamos el RBAC Columnar con un ejemplo. <\/span><b>Penny<\/b><span style=\"font-weight: 400;\">fundador de <\/span><i><span style=\"font-weight: 400;\">ClientEase<\/span><\/i><span style=\"font-weight: 400;\"> es un <\/span><a href=\"https:\/\/www.couchbase.com\/blog\/es\/couchbase-capella-columnar\/\">Capella Columnar<\/a><span style=\"font-weight: 400;\"> cliente.\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 300;\">ClientEase act\u00faa como intermediario entre las empresas y sus clientes, gestionando la asistencia y las consultas a partir de los datos facilitados por la empresa matriz. Tambi\u00e9n ofrecen asistencia eficaz en servicios de formaci\u00f3n y desarrollo.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Uno de los proyectos de ClientEase es <\/span><i><span style=\"font-weight: 300;\">Gesti\u00f3n de la cadena minorista.<\/span><\/i><span style=\"font-weight: 400;\"> Penny tiene un <\/span><b>Organizaci\u00f3n Propietaria<\/b><span style=\"font-weight: 400;\"> papel en Capella.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Penny es la fundadora de la startup y tiene muchas otras responsabilidades. Ella dio <\/span><b>Rob<\/b><span style=\"font-weight: 400;\">que es directivo, la responsabilidad de este proyecto y le nombr\u00f3 responsable del mismo.<\/span><b> Propietario del proyecto<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16314 size-full\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1.png\" alt=\"\" width=\"1999\" height=\"1293\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1.png 1999w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1-300x194.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1-1024x662.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1-768x497.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1-1536x994.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-1-1320x854.png 1320w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Rob asumi\u00f3 toda la responsabilidad del proyecto y lo dividi\u00f3 de forma estructurada. Cre\u00f3 dos clusters en Columnar denominados <\/span><i><span style=\"font-weight: 300;\">An\u00e1lisis de las ventas minoristas <\/span><\/i><span style=\"font-weight: 400;\">y <\/span><i><span style=\"font-weight: 300;\">Rendimiento del producto.<\/span><\/i><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16315 size-full\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4.png\" alt=\"\" width=\"1777\" height=\"1547\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4.png 1777w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4-300x261.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4-1024x891.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4-768x669.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4-1536x1337.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image4-1320x1149.png 1320w\" sizes=\"auto, (max-width: 1777px) 100vw, 1777px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Nombr\u00f3 a Jack y Kim. <\/span><b>Jack<\/b><span style=\"font-weight: 400;\"> se le asigna un rol Columnar <\/span><b>Lector\/escritor de bases de datos. <\/b><span style=\"font-weight: 400;\">Rob quer\u00eda que Kim se ocupara de la gesti\u00f3n y supervisi\u00f3n del cluster, pero no quer\u00eda que Kim tuviera acceso a los datos y se le asign\u00f3 <\/span><b>Jefe de proyecto<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Jack hizo un gran trabajo y cre\u00f3 bases de datos y \u00e1mbitos y colecciones tanto en el cl\u00faster de acuerdo con el caso de uso. Cre\u00f3 enlaces e ingest\u00f3 datos de <\/span><i><span style=\"font-weight: 300;\">AWS S3<\/span><\/i><span style=\"font-weight: 400;\"> a los grupos de columnas. Cre\u00f3 la siguiente estructura del proyecto que hizo realmente feliz a Rob.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16316 size-full aligncenter\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image6.png\" alt=\"\" width=\"811\" height=\"601\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image6.png 811w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image6-300x222.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image6-768x569.png 768w\" sizes=\"auto, (max-width: 811px) 100vw, 811px\" \/><\/p>\n<p><i><span style=\"font-weight: 400;\">ClientEase<\/span><\/i><span style=\"font-weight: 400;\"> utiliza <\/span><i><span style=\"font-weight: 400;\">Power BI<\/span><\/i><span style=\"font-weight: 400;\"> para el an\u00e1lisis del soporte. Rosa y Denis gestionan la asistencia al cliente para este proyecto. Rob quiere mantener las cosas limpias y distinguidas. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rob ha creado cuentas de acceso para Rosa y Denis y les ha asignado los roles y privilegios apropiados, permitiendo a Rosa leer desde ambos clusters y a Denis crear Vistas Tabulares.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16317 size-full\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3.png\" alt=\"\" width=\"1999\" height=\"932\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3.png 1999w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3-300x140.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3-1024x477.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3-768x358.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3-1536x716.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image3-1320x615.png 1320w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16318\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2.png\" alt=\"\" width=\"1999\" height=\"550\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2.png 1999w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2-300x83.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2-1024x282.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2-768x211.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2-1536x423.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image1-2-1320x363.png 1320w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Las siguientes tablas muestran los usuarios y sus funciones\/privilegios:<\/span><\/p>\n<table style=\"border: solid 1px black;\">\n<tbody>\n<tr>\n<td><b>Usuario<\/b><\/td>\n<td><b>Capella Columnar Funci\u00f3n\/privilegio<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Penny<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Organizaci\u00f3n Propietaria<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Rob<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Propietario del proyecto<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Kim<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Jefe de proyecto<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Jack<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Lectura\/escritura de datos de base de datos<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Rosa<\/span><\/td>\n<td><span style=\"font-weight: 400;\">sys_data_reader para <\/span><span style=\"font-weight: 300;\">Ventas al por menor<\/span><span style=\"font-weight: 400;\"> An\u00e1lisis y\u00a0 <\/span><i><span style=\"font-weight: 300;\">Rendimiento del producto.<\/span><\/i><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Denis<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Crear vista, Seleccionar colecci\u00f3n globalmente para <\/span><span style=\"font-weight: 300;\">Ventas al por menor<\/span><span style=\"font-weight: 400;\"> An\u00e1lisis y\u00a0 <\/span><i><span style=\"font-weight: 300;\">Rendimiento del producto.<\/span><\/i><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Todo iba sobre ruedas:<\/span><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cualquier modificaci\u00f3n de los datos fue gestionada por Jack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kim se ocupaba de la gesti\u00f3n del grupo.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rosa y Denis les prestaban apoyo.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Un d\u00eda, a ClientEase se le present\u00f3 una nueva oportunidad: la empresa matriz les pidi\u00f3 que idearan estrategias para mejorar las ventas. Aunque la startup se centra principalmente en servicios de asistencia, esta tarea es un servicio fuera de su \u00e1mbito habitual. Penny, la fundadora, vio el potencial de esta oportunidad y decidi\u00f3 aprovecharla. Con el plazo cada vez m\u00e1s cerca, para afrontar el reto opt\u00f3 por contratar a un proveedor externo especializado en an\u00e1lisis de BI, lo que garantiz\u00f3 que ClientEase pudiera ofrecer la informaci\u00f3n necesaria para impulsar las ventas de forma eficaz.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Surgi\u00f3 la preocupaci\u00f3n de que conceder acceso a la totalidad de los datos a un tercero externo podr\u00eda no ser seguro. Para hacer frente a este problema, Rob aprovech\u00f3 el control de acceso basado en roles (RBAC) de Columnar para gestionar de forma segura el acceso a los datos.\u00a0<\/span><\/p>\n<p><b>Hasan<\/b><span style=\"font-weight: 400;\"> y <\/span><b>Mary<\/b><span style=\"font-weight: 400;\">, el equipo del proveedor externo, necesitaba acceso para crear vistas anal\u00edticas tabulares (TAV) en el cl\u00faster columnar para su uso en <\/span><i><span style=\"font-weight: 400;\">Tableau,<\/span><\/i><span style=\"font-weight: 400;\"> su herramienta de BI elegida.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rob no quiere dar ning\u00fan acceso a los datos de Ventas Minoristas. Con Columnar RBAC fue muy f\u00e1cil hacerlo. Cre\u00f3 una <\/span>rol personalizado<span style=\"font-weight: 400;\"> llamado <strong>analistas <\/strong><\/span><span style=\"font-weight: 400;\">en\u00a0<\/span><i><span style=\"font-weight: 300;\">Rendimiento del producto.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Asign\u00f3 a esta funci\u00f3n personalizada el <\/span><code>CREAR VISTA<\/code><span style=\"font-weight: 400;\"> privilegio a nivel mundial, y <\/span><code>SELECCIONE<\/code><span style=\"font-weight: 400;\"> privilegio en la recogida necesaria que permita al equipo generar los TAV necesarios.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16319\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7.png\" alt=\"\" width=\"1999\" height=\"809\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7.png 1999w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7-300x121.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7-1024x414.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7-768x311.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7-1536x622.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image7-1320x534.png 1320w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Rob asign\u00f3 el rol integrado <\/span><strong>sys_data_reader<\/strong><span style=\"font-weight: 400;\">\u00a0al rol del analista. Esta combinaci\u00f3n de permisos permiti\u00f3 a Hasan y Mary acceder y visualizar los TAV creados de forma segura en Power BI, garantizando que pudieran realizar el an\u00e1lisis requerido sin comprometer la seguridad de todo el conjunto de datos.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16331\" style=\"border: solid 1px black;\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2.png\" alt=\"\" width=\"1999\" height=\"644\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2.png 1999w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2-300x97.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2-1024x330.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2-768x247.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2-1536x495.png 1536w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/image2-2-1320x425.png 1320w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<table style=\"border: solid 1px black;\">\n<tbody>\n<tr>\n<td><b>Usuario<\/b><\/td>\n<td><b>Capella Columnar Funci\u00f3n\/privilegio<\/b><\/td>\n<\/tr>\n<tr>\n<td>Hasan y Mary<\/td>\n<td>Rol personalizado -&gt; analistas (<code>CREAR VISTA<\/code> privilegio) y <code>sys_data_reader<\/code>\u00a0para\u00a0 <i>Rendimiento del producto <\/i>s\u00f3lo.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Mediante el uso de Columnar RBAC para gestionar el acceso a los datos, ClientEase garantiz\u00f3 que s\u00f3lo se pod\u00eda acceder a los datos necesarios, manteniendo la seguridad y entregando los resultados a tiempo. Este enfoque protegi\u00f3 la informaci\u00f3n confidencial durante todo el proyecto.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Resumen<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">El RBAC de Couchbase Capella Columnar proporciona un acceso granular y seguro a los datos, garantizando que los usuarios y equipos puedan acceder s\u00f3lo a lo que necesitan, manteniendo la integridad y seguridad de los datos.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Referencias<\/span><\/h2>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.youtube.com\/watch?v=pXoenAEhz9Q\"><span style=\"font-weight: 400;\">Couchbase Capella Columnar: Una visi\u00f3n t\u00e9cnica en profundidad<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/dzone.com\/articles\/accelerating-insights-with-couchbase-columnar\"><span style=\"font-weight: 400;\">Aceleraci\u00f3n de la informaci\u00f3n con Couchbase Columnar<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/dzone.com\/articles\/keep-calm-and-column-wise\"><span style=\"font-weight: 400;\">Keep Calm and Column Wise<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/docs.couchbase.com\/columnar\/intro\/intro.html\"><span style=\"font-weight: 400;\">Acerca de Capella Columnar<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" title=\"Couchbase Capella Columnar: Una visi\u00f3n t\u00e9cnica en profundidad\" width=\"900\" height=\"506\" src=\"https:\/\/www.youtube.com\/embed\/pXoenAEhz9Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>","protected":false},"excerpt":{"rendered":"<p>Controlling who can do what in your application is crucial, and in many cases not everyone should have the same permissions or capabilities in the application, as this can lead to security risks and operational inefficiencies. In this blog, we [&hellip;]<\/p>","protected":false},"author":85045,"featured_media":16321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815,10129,2225,1813],"tags":[1903],"ppma_author":[9918,10027],"class_list":["post-16313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","category-columnar","category-cloud","category-security","tag-rbac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v26.1.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Capella Columnar RBAC: Ensuring Data Security and Controlled Access - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Capella Columnar\u2019s RBAC offers secure, role-based access control, ensuring data protection with granular permission management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/data-security-capella-columnar-rbac\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Capella Columnar RBAC: Ensuring Data Security and Controlled Access\" \/>\n<meta property=\"og:description\" content=\"Capella Columnar\u2019s RBAC offers secure, role-based access control, ensuring data protection with granular permission management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/data-security-capella-columnar-rbac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-18T22:25:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T04:54:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Janhavi Tripurwar, Savyasach Enukonda - Software Engineer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Janhavi Tripurwar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/\"},\"author\":{\"name\":\"Janhavi Tripurwar\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/ab5a3d2b46d873085ba0070bd4db0e5e\"},\"headline\":\"Capella Columnar RBAC: Ensuring Data Security and Controlled Access\",\"datePublished\":\"2024-09-18T22:25:43+00:00\",\"dateModified\":\"2025-06-14T04:54:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/\"},\"wordCount\":866,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png\",\"keywords\":[\"RBAC\"],\"articleSection\":[\"Best Practices and Tutorials\",\"Columnar\",\"Couchbase Capella\",\"Security\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/\",\"name\":\"Capella Columnar RBAC: Ensuring Data Security and Controlled Access - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png\",\"datePublished\":\"2024-09-18T22:25:43+00:00\",\"dateModified\":\"2025-06-14T04:54:22+00:00\",\"description\":\"Capella Columnar\u2019s RBAC offers secure, role-based access control, ensuring data protection with granular permission management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png\",\"width\":2400,\"height\":1256,\"caption\":\"Couchbase Capella Columnar with fine grained RBAC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Capella Columnar RBAC: Ensuring Data Security and Controlled Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/ab5a3d2b46d873085ba0070bd4db0e5e\",\"name\":\"Janhavi Tripurwar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/64d603d2bd0a1ec20290c1f5a67d6e53\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg\",\"caption\":\"Janhavi Tripurwar\"},\"url\":\"https:\/\/www.couchbase.com\/blog\/es\/author\/janhavitripurwar\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Capella Columnar RBAC: Ensuring Data Security and Controlled Access - The Couchbase Blog","description":"El RBAC de Capella Columnar ofrece un control de acceso seguro y basado en roles, garantizando la protecci\u00f3n de datos con una gesti\u00f3n de permisos granular.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/data-security-capella-columnar-rbac\/","og_locale":"es_MX","og_type":"article","og_title":"Capella Columnar RBAC: Ensuring Data Security and Controlled Access","og_description":"Capella Columnar\u2019s RBAC offers secure, role-based access control, ensuring data protection with granular permission management.","og_url":"https:\/\/www.couchbase.com\/blog\/es\/data-security-capella-columnar-rbac\/","og_site_name":"The Couchbase Blog","article_published_time":"2024-09-18T22:25:43+00:00","article_modified_time":"2025-06-14T04:54:22+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png","type":"image\/png"}],"author":"Janhavi Tripurwar, Savyasach Enukonda - Software Engineer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Janhavi Tripurwar","Est. reading time":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/"},"author":{"name":"Janhavi Tripurwar","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/ab5a3d2b46d873085ba0070bd4db0e5e"},"headline":"Capella Columnar RBAC: Ensuring Data Security and Controlled Access","datePublished":"2024-09-18T22:25:43+00:00","dateModified":"2025-06-14T04:54:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/"},"wordCount":866,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png","keywords":["RBAC"],"articleSection":["Best Practices and Tutorials","Columnar","Couchbase Capella","Security"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/","url":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/","name":"Capella Columnar RBAC: Ensuring Data Security and Controlled Access - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png","datePublished":"2024-09-18T22:25:43+00:00","dateModified":"2025-06-14T04:54:22+00:00","description":"El RBAC de Capella Columnar ofrece un control de acceso seguro y basado en roles, garantizando la protecci\u00f3n de datos con una gesti\u00f3n de permisos granular.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/blog-columnar-rbac.png","width":2400,"height":1256,"caption":"Couchbase Capella Columnar with fine grained RBAC"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/data-security-capella-columnar-rbac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Capella Columnar RBAC: Ensuring Data Security and Controlled Access"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/ab5a3d2b46d873085ba0070bd4db0e5e","name":"Janhavi Tripurwar","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/64d603d2bd0a1ec20290c1f5a67d6e53","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg","caption":"Janhavi Tripurwar"},"url":"https:\/\/www.couchbase.com\/blog\/es\/author\/janhavitripurwar\/"}]}},"authors":[{"term_id":9918,"user_id":85045,"is_guest":0,"slug":"janhavitripurwar","display_name":"Janhavi Tripurwar","avatar_url":{"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg","url2x":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2024\/09\/janhavi-couchbase.jpg"},"author_category":"","last_name":"Tripurwar","first_name":"Janhavi","job_title":"Software Engineer 2","user_url":"","description":""},{"term_id":10027,"user_id":85523,"is_guest":0,"slug":"savyasachenukonda","display_name":"Savyasach Enukonda - Software Engineer","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/1572b25b8560cc75aaf3df7afb47070015bf69a69dd78630240b38ced9c6d152?s=96&d=mm&r=g","author_category":"","last_name":"Enukonda - Software Engineer","first_name":"Savyasach","job_title":"Software Engineer","user_url":"","description":""}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/16313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/85045"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=16313"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/16313\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/16321"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=16313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=16313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=16313"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=16313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}