{"id":1886,"date":"2015-02-17T12:56:07","date_gmt":"2015-02-17T12:56:07","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=1886"},"modified":"2023-07-20T04:28:29","modified_gmt":"2023-07-20T11:28:29","slug":"data-encryption-in-couchbase-server","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/es\/data-encryption-in-couchbase-server\/","title":{"rendered":"Cifrado de datos en Couchbase Server"},"content":{"rendered":"<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';text-align: left;line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 28px;font-family: 'Trebuchet MS';vertical-align: baseline;background-color: transparent\">Cifrado de datos con Couchbase Server<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Con m\u00e1s y m\u00e1s datos almacenados en Couchbase, la seguridad de big data se ha convertido en un tema candente en estos d\u00edas. Las organizaciones de todos los sectores verticales y p\u00fablicos se enfrentan cada vez m\u00e1s al reto de proteger sus activos de datos sensibles, o a graves sanciones si no lo hacen. En un reciente informe sobre amenazas internas <span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> publicado por Vormetric, 93% de las organizaciones estadounidenses afirman ser vulnerables a las amenazas internas.<\/span><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\"> Cifrado de datos<\/span><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> es una forma efectiva de prevenir el acceso a datos sensibles y se ha convertido en un importante control de seguridad en muchos est\u00e1ndares regulatorios, incluyendo ataques internos de seguridad. Este blog repasar\u00e1 los m\u00faltiples niveles en los que puedes proteger tus datos sensibles para tu aplicaci\u00f3n Couchbase. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cifrado de datos en la aplicaci\u00f3n <\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Incluso antes de que los datos lleguen al cable y sean enviados al servidor, puedes encriptarlos dentro de tu aplicaci\u00f3n. El modelo de datos de Couchbase te permite almacenar tanto documentos JSON como datos binarios (por ejemplo un blob encriptado). En muchos sentidos, tu aplicaci\u00f3n es el mejor lugar para encriptar datos porque sabe exactamente si la informaci\u00f3n es sensible o no y puede aplicar protecci\u00f3n selectivamente. Para que tu aplicaci\u00f3n cifre los datos, necesitar\u00e1s una clave de cifrado y esta clave debe mantenerse en secreto, ya sea mediante un llavero seguro o en un m\u00f3dulo de seguridad de hardware (HSM). Nunca es una buena idea implementar tu propio algoritmo de encriptaci\u00f3n y si quieres encriptar datos en tu app, deber\u00edas usar una librer\u00eda de encriptaci\u00f3n est\u00e1ndar. Por ejemplo, Vormetric proporciona bibliotecas de cifrado de aplicaciones<\/span><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> que pueden utilizarse sin la complejidad y el riesgo de implantar una soluci\u00f3n interna de cifrado y gesti\u00f3n de claves. \u00a0<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">No olvide consultar tambi\u00e9n el ejemplo python <\/span><a href=\"https:\/\/gist.github.com\/dodilp\/f6e41f9db09a0e8d2b6f\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">c\u00f3digo<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> para encriptar datos a nivel de campo en Couchbase. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cifrado de datos en movimiento<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cuando los datos se mueven entre el cliente y el servidor<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Por eso, cuando los datos est\u00e1n en la red, hay que protegerlos de un atacante que esp\u00ede la conexi\u00f3n. <\/span><a href=\"https:\/\/www.couchbase.com\/blog\/es\/developers\/\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">SDK de Couchbase 2.0<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> y superiores con Couchbase Server 3.0 habilitan el acceso encriptado de datos usando SSL para comunicaciones cliente-servidor. Sin SSL (como se muestra en la imagen de abajo), un simple sondeo wireshark de la conexi\u00f3n entre el cliente y el servidor puede revelar bastante informaci\u00f3n sensible.<\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Con SSL activado, los datos hacia y desde el servidor se cifran utilizando el certificado del servidor que se configura y almacena en el almac\u00e9n de certificados del cliente.  Es una buena pr\u00e1ctica de seguridad, regenerar el certificado SSL peri\u00f3dicamente seg\u00fan los requisitos de seguridad de su organizaci\u00f3n.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Adem\u00e1s del acceso encriptado a los datos, Couchbase 3.0 tambi\u00e9n incluye soporte para acceso seguro al administrador. Esto permite a los administradores navegar de forma segura y administrar Couchbase Server a trav\u00e9s del navegador, incluso a trav\u00e9s de una red p\u00fablica.  \u00bfC\u00f3mo se ve una conexi\u00f3n encriptada bajo wireshark? Echa un vistazo a la captura de pantalla de wireshark a continuaci\u00f3n - <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\"><img decoding=\"async\" alt=\"Screen Shot 2015-02-16 at 3.12.34 PM.png\" height=\"300px;\" src=\"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI\" style=\"border-style: none\" width=\"624px;\" \/><\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\n\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cuando los datos se mueven entre servidores dentro de un cl\u00faster<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Tus datos deben estar disponibles para tus aplicaciones 24x7x365. Esto significa que si un servidor muere en el cl\u00faster, tu aplicaci\u00f3n deber\u00eda poder seguir accediendo a tus datos. Para una alta disponibilidad, Couchbase replica los datos dentro del cluster y a trav\u00e9s de los centros de datos - dentro de un cluster, cada documento almacenado en Couchbase puede ser replicado hasta 3 veces.  Si todos tus datos sensibles ya est\u00e1n encriptados en los documentos, las copias de r\u00e9plica se transmitir\u00e1n tal cual y se almacenar\u00e1n (es decir, encriptadas). Para mayor seguridad, es una buena pr\u00e1ctica utilizar IPSec en la red entre los nodos del servidor Couchbase.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cuando los datos se mueven entre centros de datos<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Si tienes centros de datos en diferentes geograf\u00edas, y te preocupa que los datos sensibles fluyan entre ellos, puedes utilizar la funci\u00f3n XDCR segura (Replicaci\u00f3n entre centros de datos) de Couchbase.   Secure XDCR te permite encriptar el tr\u00e1fico entre dos centros de datos usando una conexi\u00f3n SSL. Cuando usas la Replicaci\u00f3n Segura entre Centros de Datos (XDCR), todo el tr\u00e1fico en los centros de datos de origen y destino ser\u00e1 encriptado. Esto provocar\u00e1 un ligero aumento de la carga de la CPU, ya que cualquier cifrado necesita ciclos de CPU adicionales. Es una buena pr\u00e1ctica de seguridad rotar peri\u00f3dicamente los certificados XDCR seg\u00fan las pol\u00edticas de seguridad de su organizaci\u00f3n. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Cifrado de datos en disco <\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Vormetric ofrece una soluci\u00f3n de cifrado potente, transparente y basada en pol\u00edticas para Couchbase Server. Con Vormetric, los datos sensibles en Couchbase se cifrar\u00e1n en reposo en el disco. Esto asegura que sus datos no se ver\u00e1n comprometidos si su base de datos es robada, copiada, perdida o se accede a ella de forma indebida. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">La soluci\u00f3n implica agentes Vormetric instalados en la capa de almacenamiento, que cifran los datos de forma transparente.  Los agentes hablan con un gestor de seguridad de datos distribuido que podr\u00eda ser un dispositivo f\u00edsico \/ virtual y es responsable de almacenar de forma segura las claves de cifrado. Couchbase lee y escribe informaci\u00f3n sensible en la capa de almacenamiento sin ning\u00fan cambio en la aplicaci\u00f3n o en la base de datos. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"><img decoding=\"async\" alt=\"Screen Shot 2015-02-16 at 3.28.05 PM.png\" height=\"315px;\" src=\"https:\/\/lh6.googleusercontent.com\/iPQm9CL96Tfik55TuDM-BO8MOqDXappB-WJKhGbhprCZvXlZCarKTU_1TloJSGhpqFrdDx6YmtKIEZ3M32F9u-4u6h7hxLSG8ptx-01mvPKCKRR4qi6CX_f_j3fL0sWDNl0\" style=\"border-style: none\" width=\"374px;\" \/><\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';text-align: left;line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Para obtener m\u00e1s informaci\u00f3n sobre el funcionamiento conjunto de Vormetric y Couchbase, no olvide registrarse en nuestro <\/span><a href=\"https:\/\/w.on24.com\/r.htm?e=942985&amp;s=1&amp;k=CA9E4BFFEDEFC9FE70ADA44901836DB9\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">pr\u00f3ximo seminario web en directo<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">.<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"ppma_author":[8972],"class_list":["post-1886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data encryption in Couchbase Server - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/es\/data-encryption-in-couchbase-server\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data encryption in Couchbase Server\" \/>\n<meta property=\"og:description\" content=\"Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/es\/data-encryption-in-couchbase-server\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-17T12:56:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T11:28:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI\" \/>\n<meta name=\"author\" content=\"Don Pinto, Principal Product Manager, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Don Pinto, Principal Product Manager, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/\"},\"author\":{\"name\":\"Don Pinto, Principal Product Manager, Couchbase\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/eb130a1e0278989e089a7fbbf8bc754c\"},\"headline\":\"Data encryption in Couchbase Server\",\"datePublished\":\"2015-02-17T12:56:07+00:00\",\"dateModified\":\"2023-07-20T11:28:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/\"},\"wordCount\":804,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/\",\"name\":\"Data encryption in Couchbase Server - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2015-02-17T12:56:07+00:00\",\"dateModified\":\"2023-07-20T11:28:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2022\\\/11\\\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/data-encryption-in-couchbase-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data encryption in Couchbase Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/eb130a1e0278989e089a7fbbf8bc754c\",\"name\":\"Don Pinto, Principal Product Manager, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g39c6d6178c73f0dc09af63f930a4f37d\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g\",\"caption\":\"Don Pinto, Principal Product Manager, Couchbase\"},\"description\":\"Don Pinto is a Principal Product Manager at Couchbase and is currently focused on advancing the capabilities of Couchbase Server. He is extremely passionate about data technology, and in the past has authored several articles on Couchbase Server including technical blogs and white papers. Prior to joining Couchbase, Don spent several years at IBM where he maintained the role of software developer in the DB2 information management group and most recently as a program manager on the SQL Server team at Microsoft. Don holds a master's degree in computer science and a bachelor's in computer engineering from the University of Toronto, Canada.\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/es\\\/author\\\/don-pinto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data encryption in Couchbase Server - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/es\/data-encryption-in-couchbase-server\/","og_locale":"es_MX","og_type":"article","og_title":"Data encryption in Couchbase Server","og_description":"Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/es\/data-encryption-in-couchbase-server\/","og_site_name":"The Couchbase Blog","article_published_time":"2015-02-17T12:56:07+00:00","article_modified_time":"2023-07-20T11:28:29+00:00","og_image":[{"url":"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI","type":"","width":"","height":""}],"author":"Don Pinto, Principal Product Manager, Couchbase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Don Pinto, Principal Product Manager, Couchbase","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"},"author":{"name":"Don Pinto, Principal Product Manager, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c"},"headline":"Data encryption in Couchbase Server","datePublished":"2015-02-17T12:56:07+00:00","dateModified":"2023-07-20T11:28:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"},"wordCount":804,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Uncategorized"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/","url":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/","name":"Data encryption in Couchbase Server - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2015-02-17T12:56:07+00:00","dateModified":"2023-07-20T11:28:29+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data encryption in Couchbase Server"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"El blog de Couchbase","description":"Couchbase, la base de datos NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"El blog de Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c","name":"Don Pinto, Director Principal de Producto, Couchbase","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g39c6d6178c73f0dc09af63f930a4f37d","url":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","caption":"Don Pinto, Principal Product Manager, Couchbase"},"description":"Don Pinto es Gerente Principal de Producto en Couchbase y actualmente est\u00e1 enfocado en avanzar las capacidades de Couchbase Server. Es un apasionado de la tecnolog\u00eda de datos, y en el pasado ha escrito varios art\u00edculos sobre Couchbase Server, incluyendo blogs t\u00e9cnicos y libros blancos. Antes de unirse a Couchbase, Don pas\u00f3 varios a\u00f1os en IBM, donde desempe\u00f1\u00f3 el papel de desarrollador de software en el grupo de gesti\u00f3n de la informaci\u00f3n DB2 y, m\u00e1s recientemente, como director de programa en el equipo de SQL Server en Microsoft. Don tiene un m\u00e1ster en inform\u00e1tica y una licenciatura en ingenier\u00eda inform\u00e1tica por la Universidad de Toronto, Canad\u00e1.","url":"https:\/\/www.couchbase.com\/blog\/es\/author\/don-pinto\/"}]}},"acf":[],"authors":[{"term_id":8972,"user_id":4,"is_guest":0,"slug":"don-pinto","display_name":"Don Pinto, Principal Product Manager, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/1886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/comments?post=1886"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/posts\/1886\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/media?parent=1886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/categories?post=1886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/tags?post=1886"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/es\/wp-json\/wp\/v2\/ppma_author?post=1886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}