{"id":9680,"date":"2021-09-09T00:00:41","date_gmt":"2021-09-09T07:00:41","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=9680"},"modified":"2025-06-13T20:45:57","modified_gmt":"2025-06-14T03:45:57","slug":"at-rest-data-security-with-luks-encryption","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/ko\/at-rest-data-security-with-luks-encryption\/","title":{"rendered":"Couchbase\uc758 LUKS \ub514\uc2a4\ud06c \uc554\ud638\ud654\ub85c \uc800\uc7a5\ub41c \ub370\uc774\ud130 \ubcf4\ud638"},"content":{"rendered":"<p><strong>Couchbase\ub294 \uc774\uc81c LUKS \ub514\uc2a4\ud06c \uc554\ud638\ud654\ub97c \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/strong> \ub97c \uc0ac\uc6a9\ud558\uc5ec \uc800\uc7a5\ub41c \ub370\uc774\ud130\ub97c \uc548\uc804\ud558\uac8c \ubcf4\ud638\ud569\ub2c8\ub2e4. LUKS\ub294 \uc5bc\ub9c8\ub098 \uc548\uc804\ud55c\uac00\uc694?<\/p>\n<p>Couchbase 7.0\uc740 \ubcf4\uc548\uc5d0 \uc911\uc810\uc744 \ub450\uc5b4 \ub2e4\uc74c \ub450 \uac00\uc9c0\ub97c \ubaa8\ub450 \uc9c0\uc6d0\ud569\ub2c8\ub2e4. <a href=\"https:\/\/www.couchbase.com\/blog\/ko\/introducing-rbac-security-for-collections\/?ref=blog\" target=\"_blank\" rel=\"noopener\">\ubc94\uc704 \ubc0f \uceec\ub809\uc158\uc744 \uc704\ud55c \uc5ed\ud560 \uae30\ubc18 \uc561\uc138\uc2a4 \uc81c\uc5b4(RBAC)<\/a>)\ub97c \ud1b5\ud574 \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130\ub97c \uc554\ud638\ud654\ud558\uace0, Linux \ud1b5\ud569 \ud0a4 \uc124\uc815(<a href=\"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/7\/html\/security_guide\/sec-encryption#sec-Using_LUKS_Disk_Encryption\/?ref=hello-from-couchbase\" target=\"_blank\" rel=\"noopener\">LUKS<\/a>).<\/p>\n<p>\ub514\uc2a4\ud06c \uc554\ud638\ud654\ub294 \ubaa8\ub4e0 \uc870\uc9c1\uc758 \ub370\uc774\ud130 \ubcf4\uc548 \uc804\ub7b5\uacfc PCI DSS, FIPS, FISMA, GDPR \ubc0f \uae30\ud0c0 \uaddc\uc81c \ud45c\uc900 \uc900\uc218\ub97c \uc704\ud55c \ud544\uc218 \uc694\uc18c\uc785\ub2c8\ub2e4.<\/p>\n<p>\uadf8\ub807\ub2e4\uba74 LUKS \uc554\ud638\ud654\ub294 \uc548\uc804\ud55c\uac00\uc694? \uc774 \uac8c\uc2dc\ubb3c\uc5d0\uc11c\ub294 Couchbase Server \ud074\ub7ec\uc2a4\ud130\uc5d0 \uc788\ub294 \ubb38\uc11c\uc758 \uc138 \ub2e8\uacc4\uc778 \ucc98\ub9ac \uc911\uc778 \ub370\uc774\ud130, \uc804\uc1a1 \uc911\uc778 \ub370\uc774\ud130, \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130(\uc544\ub798 \ud45c \ucc38\uc870)\uc5d0 \ub300\ud55c \ubcf4\uc548 \uc635\uc158\uc5d0 \ub300\ud55c \uac1c\uc694\ubd80\ud130 \uc0b4\ud3b4\ubcf8 \ub2e4\uc74c LUKS \uc628\ub514\uc2a4\ud06c \uc554\ud638\ud654\ub97c \ud1b5\ud55c \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130 \ubcf4\uc548\uc758 \uc138\ubd80 \uc0ac\ud56d\uc744 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/p>\n<table>\n<caption><strong>3\ub2e8\uacc4 \ubb38\uc11c \uc554\ud638\ud654 \uc635\uc158<\/strong><\/caption>\n<tbody>\n<tr>\n<td><strong>\uc2a4\ud14c\uc774\uc9c0<\/strong><\/td>\n<td><strong>\uc124\uba85<\/strong><\/td>\n<td><strong>\uc0ac\uc6a9 \uc0ac\ub840<\/strong><\/td>\n<td><strong>Couchbase\uc758 \uc554\ud638\ud654 \uc635\uc158<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\ucc98\ub9ac \uc911\uc778 \ub370\uc774\ud130<\/td>\n<td>\ud65c\uc131 \ub370\uc774\ud130, \uc2dc\uc2a4\ud15c \ub0b4 \uba54\ubaa8\ub9ac<\/td>\n<td>\uc0ac\uc6a9 \uc911\uc778 \ubb38\uc11c<\/td>\n<td>\uc560\ud50c\ub9ac\ucf00\uc774\uc158 \uacc4\uce35\uc758 \ud544\ub4dc \uc218\uc900 \uc554\ud638\ud654<\/td>\n<\/tr>\n<tr>\n<td>\uc804\uc1a1 \uc911\uc778 \ub370\uc774\ud130<\/td>\n<td>\uc2dc\uc2a4\ud15c \uac04\uc5d0 \uc774\ub3d9\ud558\ub294 \ub370\uc774\ud130<\/td>\n<td>\ubcf5\uc81c, \ub370\uc774\ud130 \uc13c\ud130 \uac04 \ubcf5\uc81c(XDCR)<\/td>\n<td>TLS \uc554\ud638\ud654, <a href=\"https:\/\/www.couchbase.com\/blog\/ko\/x-509-certificate-based-authentication\/?ref=blog\" target=\"_blank\" rel=\"noopener\">X.509 \uc778\uc99d\uc11c<\/a><\/td>\n<\/tr>\n<tr>\n<td>\uc800\uc7a5\ub41c \ub370\uc774\ud130<\/td>\n<td>\uc0ac\uc6a9 \uc911\uc774 \uc544\ub2cc \ub370\uc774\ud130<\/td>\n<td>\uc624\ud504\ub77c\uc778 \uba38\uc2e0\uc758 \ub514\uc2a4\ud06c\uc5d0 \uc788\ub294 \ubc84\ud0b7<\/td>\n<td>LUKS\ub97c \ud3ec\ud568\ud55c \ub2e4\uc591\ud55c \uc635\uc158\uacfc \ub2e4\uc74c\uacfc \uac19\uc740 \ud0c0\uc0ac \uc194\ub8e8\uc158 \uc9c0\uc6d0 <a href=\"https:\/\/cpl.thalesgroup.com\/encryption\/vormetric-data-security-platform\/?ref=hello-from-couchbase\" target=\"_blank\" rel=\"noopener\">\ud0c8\ub808\uc2a4 \ubcf4\uba54\ud2b8\ub9ad<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\uc800\uc7a5 \ub370\uc774\ud130 \uc554\ud638\ud654\ub97c \uc0ac\uc6a9\ud558\ub294 \uc774\uc720\ub294 \ubb34\uc5c7\uc778\uac00\uc694?<\/h2>\n<p>\ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130 \uc554\ud638\ud654\ub294 \uc7a0\uaca8 \uc788\uac70\ub098 \uc624\ud504\ub77c\uc778 \uc800\uc7a5 \uc2dc\uc2a4\ud15c\uc744 \ubcf4\ud638\ud558\uace0 \uc801\uc808\ud55c \uad8c\ud55c\uacfc \uc561\uc138\uc2a4 \uad8c\ud55c \uc5c6\uc774\ub294 \ub370\uc774\ud130\ub97c \uc77d\uc744 \uc218 \uc5c6\ub3c4\ub85d \ud569\ub2c8\ub2e4. \uc7a5\uce58\uac00 \uc628\ub77c\uc778 \uc0c1\ud0dc\uc774\uace0 \uc7a0\uae08\uc774 \ud574\uc81c\ub418\uc5b4 \uc791\ub3d9 \uc911\uc778 \ub3d9\uc548\uc5d0\ub294 \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130\ub85c \uc554\ud638\ud654\ub41c \ub370\uc774\ud130\uac00 \ubcf4\ud638\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc774\ub97c \uc704\ud574\uc11c\ub294 \uc704 \ud45c\uc5d0 \uc5b8\uae09\ub41c \ub2e4\ub978 \uc554\ud638\ud654 \ubc29\ubc95 \uc911 \ud558\ub098\ub97c \uc0ac\uc6a9\ud574\uc57c \ud569\ub2c8\ub2e4.<\/p>\n<p>\ub2e4\uc74c\uc740 \ubbf8\uc0ac\uc6a9 \ub370\uc774\ud130 \uc554\ud638\ud654\uc5d0 \ub300\ud55c \uc77c\ubc18\uc801\uc778 \uc2dc\ub098\ub9ac\uc624\uc785\ub2c8\ub2e4:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>\ub370\uc774\ud130 \uc720\ucd9c \uac00\ub2a5\uc131\uc73c\ub85c\ubd80\ud130 \uae30\ubc00 \ub610\ub294 \uac1c\uc778 \uc2dd\ubcc4 \uc815\ubcf4\ub97c \ubcf4\ud638\ud558\ub824\uba74 \ub2e4\uc74c\uacfc \uac19\uc774 \ud558\uc138\uc694.<\/li>\n<li>\uc2a4\ub9c8\ud2b8\ud3f0\uacfc \uac19\uc740 \uc7a5\uce58\uc5d0\uc11c\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \uc804\uccb4 \ub514\uc2a4\ud06c \uc554\ud638\ud654\ub77c\uace0 \ud569\ub2c8\ub2e4.<\/li>\n<li>\ud074\ub77c\uc6b0\ub4dc\uc640 \uac19\uc774 \uc5ec\ub7ec \uc0ac\uc6a9\uc790\uac00 \ub3d9\uc77c\ud55c \uae30\ubcf8 \ud558\ub4dc\uc6e8\uc5b4\uc5d0 \uc561\uc138\uc2a4\ud558\ub294 \ud658\uacbd\uc758 \uacbd\uc6b0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<h2>LUKS \ub514\uc2a4\ud06c \uc554\ud638\ud654<\/h2>\n<p>LUKS\ub294 Linux \ud658\uacbd\uc5d0\uc11c \ub514\uc2a4\ud06c \uc554\ud638\ud654\ub97c \uc704\ud55c \uc0ac\uc2e4\uc0c1 \ud45c\uc900\uc73c\ub85c \uc0ac\uc6a9\ub418\ub294 \uc644\uc804 \uc624\ud508 \uc18c\uc2a4 \ub3c4\uad6c\uc785\ub2c8\ub2e4.<\/p>\n<p>\ubaa8\ub4e0 Couchbase \uc778\uc99d Linux \uc6b4\uc601 \uccb4\uc81c\uc5d0 \ud3ec\ud568\ub418\uc5b4 \uc788\uc73c\uba70 \uac01 OS \uacf5\uae09\uc5c5\uccb4\uc5d0\uc11c \uc9c0\uc6d0\ud569\ub2c8\ub2e4. LUKS\ub294 \ucee4\ub110 \uacc4\uce35\uc5d0 \uc704\uce58\ud558\uba70 \ub514\uc2a4\ud06c \ube14\ub85d \uc218\uc900\uc5d0\uc11c \uc2a4\ud1a0\ub9ac\uc9c0\ub97c \uc554\ud638\ud654\ud558\ubbc0\ub85c \uc0ac\uc6a9\uc790\ub294 \uc774 \ube14\ub85d \uc218\uc900 \uc554\ud638\ud654 \uc704\uc5d0 \ubaa8\ub4e0 \ud30c\uc77c \uc2dc\uc2a4\ud15c\uc744 \ud22c\uba85\ud558\uac8c \ubc30\ud3ec\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. LUKS\ub294 \uc2a4\ud1a0\ub9ac\uc9c0 \ud30c\ud2f0\uc158\uc744 \uc554\ud638\ud654\ud560 \uc218 \uc788\uc73c\uba70, \ub2e8\uc77c \ub4dc\ub77c\uc774\ube0c, \uba40\ud2f0 \ub514\uc2a4\ud06c RAID \uc5b4\ub808\uc774, \ub17c\ub9ac \ubcfc\ub968 \uad00\ub9ac\uc790(LVM), \uc2ec\uc9c0\uc5b4 \ud30c\uc77c \ubc31\uc5c5 \ud30c\ud2f0\uc158\uae4c\uc9c0 \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h3>LUKS \uc554\ud638\ud654\ub294 \ubb34\uc5c7\uc5d0 \uc88b\uc740\uac00\uc694?<\/h3>\n<p>LUKS\ub294 \uc720\uc5f0\ud558\uba70 \ub2e4\uc591\ud55c \uc554\ud638 \uc81c\ud488\uad70\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n<p>\uae30\ubcf8\uc801\uc73c\ub85c Red Hat 8 Linux \ud658\uacbd\uc5d0\uc11c LUKS\ub294 \ubcf4\uc548\uc131\uc774 \ub6f0\uc5b4\ub09c 512\ube44\ud2b8 AES(\uace0\uae09 \uc554\ud638\ud654 \ud45c\uc900) \ud0a4\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc554\ud638\ud654\ub41c LUKS \ubcfc\ub968\uc5d0\ub294 \uc5ec\ub7ec \uac1c\uc758 \ud0a4 \uc2ac\ub86f\uc774 \uc788\uc5b4 \uc0ac\uc6a9\uc790\uac00 \ubc31\uc5c5 \ud0a4 \ub610\ub294 \uc554\ud638\ub97c \ucd94\uac00\ud560 \uc218 \uc788\uc73c\uba70, Argon2\ub97c \uc0ac\uc6a9\ud558\uc5ec \ud0a4 \ud574\uc9c0 \ubc0f \uc798\ubabb\ub41c \uc554\ud638\uc5d0 \ub300\ud55c \ubcf4\ud638\uc640 \uac19\uc740 \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<h3>...\uadf8\ub9ac\uace0 \uc5b4\ub5a4 \uacbd\uc6b0\uc5d0 \uc88b\uc9c0 \uc54a\uc744\uae4c\uc694?<\/h3>\n<p>LUKS\ub294 MacOS \ubc0f Windows\uc640 \uac19\uc740 Linux \uc774\uc678\uc758 \ud50c\ub7ab\ud3fc\uc5d0 \ubc30\ud3ec\ub41c Couchbase \uc778\uc2a4\ud134\uc2a4\uc5d0\ub294 \uc801\ud569\ud55c \uc635\uc158\uc774 \uc544\ub2d9\ub2c8\ub2e4. \ub610\ud55c \uc6b4\uc601 \uccb4\uc81c \uacf5\uae09\uc5c5\uccb4\uc640 \uc9c0\uc6d0 \uacc4\uc57d\uc744 \ub9fa\uc9c0 \uc54a\uc740 \uace0\uac1d\uc5d0\uac8c\ub294 \uc801\ud569\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/p>\n<p>Microsoft EFS(\uc554\ud638\ud654\ub41c \ud30c\uc77c \uc2dc\uc2a4\ud15c)\uc640 \uac19\uc740 \ud45c\uc900 OS \uc81c\uacf5 \uc554\ud638\ud654 \uae30\uc220 \ub610\ub294 <a href=\"https:\/\/docs.couchbase.com\/server\/current\/manage\/manage-security\/manage-connections-and-disks.html?ref=blog#securing-on-disk-data\u200b\u200b\" target=\"_blank\" rel=\"noopener\">Couchbase\uc758 \ud0c0\uc0ac \ubbf8\uc0ac\uc6a9 \uc554\ud638\ud654 \ud30c\ud2b8\ub108<\/a> \ub294 \uc870\uc9c1\uc5d0\uc11c Linux\ub97c \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uac70\ub098 OS \uacf5\uae09\uc5c5\uccb4\uc640 \uc9c0\uc6d0 \uacc4\uc57d\uc744 \ub9fa\uc9c0 \uc54a\uc740 \uacbd\uc6b0 \ub354 \ub098\uc740 \uc635\uc158\uc785\ub2c8\ub2e4.<\/p>\n<h2>LUKS Security\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc800\uc7a5\ub41c \uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ub370\uc774\ud130 \uc554\ud638\ud654\ud558\uae30<\/h2>\n<p>You have several ways to implement LUKS in a Linux environment \u2013 most commonly using `dm-crypt`(part of the kernel-level device mapper infrastructure) and the `cryptsetup` command-line utility to set up `dm-crypt` targets.<\/p>\n<p>\ub2e4\uc74c \ucf54\ub4dc \uc0d8\ud50c\uc5d0\uc11c\ub294 Ubuntu 16 Couchbase Server \ud074\ub7ec\uc2a4\ud130\uc5d0\uc11c LVM\uc73c\ub85c \ub514\uc2a4\ud06c\ub97c \uc124\uc815\ud558\ub294 \ub370 \uc0ac\uc6a9\ud55c \uba85\ub839\uc758 \uc608\ub97c \ubcf4\uc5ec\ub4dc\ub9ac\uaca0\uc2b5\ub2c8\ub2e4. \uadf8\ub7f0 \ub2e4\uc74c LUKS\ub85c \uc554\ud638\ud654\ub41c \ub17c\ub9ac \ubcfc\ub968\uc744 \ubc30\ud3ec\ud558\uace0 \uc774\ub97c Couchbase Server \ub178\ub4dc\uc758 \ub370\uc774\ud130 \ub514\ub809\ud130\ub9ac\ub85c \ub9c8\uc6b4\ud2b8\ud558\ub294 \ubc29\ubc95\uc744 \ubcf4\uc5ec\ub4dc\ub9ac\uaca0\uc2b5\ub2c8\ub2e4. \uc774\ub807\uac8c \ud558\uba74 Couchbase Server\uac00 \uce68\ud574\ub418\ub294 \uacbd\uc6b0 \uad8c\ud55c\uc774 \uc5c6\ub294 \uc0ac\uc6a9\uc790\uac00 Couchbase \ubc84\ud0b7\uc758 \uae30\ubc00 \ub370\uc774\ud130\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc5c6\uac8c \ub429\ub2c8\ub2e4.<\/p>\n<p><em>\uc5ec\uae30\uc5d0 \uc81c\uacf5\ub41c \ub2e8\uacc4\ub294 Couchbase Server 7.0\uc758 GA(\uc77c\ubc18 \uc0ac\uc6a9 \uac00\ub2a5\uc131) \ub9b4\ub9ac\uc2a4 \uc774\uc804\uc5d0 \uc81c\uacf5\ub418\uc5c8\uc73c\uba70 \ub9b4\ub9ac\uc2a4 \uc2dc\uc810 \ub610\ub294 \ud5a5\ud6c4 \uc5c5\uadf8\ub808\uc774\ub4dc\ub97c \ud1b5\ud574 \ubcc0\uacbd\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ud56d\uc0c1 <a href=\"https:\/\/docs.couchbase.com\/server\/current\/manage\/manage-security\/manage-connections-and-disks.html?ref=blog#securing-on-disk-data\" target=\"_blank\" rel=\"noopener\">\ucd5c\uc2e0 \uc81c\ud488 \uc815\ubcf4\ub294 \ubcf4\uc548\uc5d0 \uad00\ud55c Couchbase \uc124\uba85\uc11c\ub97c \ucc38\uc870\ud558\uc138\uc694.<\/a>.<\/em><\/p>\n<p>\ud074\ub7ec\uc2a4\ud130\uc5d0 \ucd94\uac00\ud558\uace0 \ub370\uc774\ud130\ub97c \ubc84\ud0b7\uc5d0 \ub85c\ub4dc\ud558\uae30 \uc804\uc5d0 Couchbase Server \ub178\ub4dc\uc5d0\uc11c \ub2e4\uc74c \ub2e8\uacc4\ub97c \uc218\ud589\ud558\uc138\uc694. <strong>\ucc38\uace0: \uc774 \ub2e8\uacc4\ub97c \uc218\ud589\ud558\uba74 \ud604\uc7ac \ub300\uc0c1 \ub514\uc2a4\ud06c\uc5d0 \uc788\ub294 \ubaa8\ub4e0 \ub0b4\uc6a9\uc774 \uc9c0\uc6cc\uc9c0\ubbc0\ub85c \uc8fc\uc758\ud558\uace0 \uc62c\ubc14\ub978 \uc7a5\uce58\uc5d0 \uc4f0\uace0 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694.<\/strong><\/p>\n<p><strong>1.<\/strong> Install the `lvm` and `cryptsetup` utility.<\/p>\n<pre class=\"\">sudo apt-get install lvm2 cryptsetup\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>2.<\/strong> Configure the drive (`\/dev\/sdb`) and create a new primary partition to use LVM.<\/p>\n<pre class=\"\">$ sudo fdisk \/dev\/sdb\r\n\r\nCommand (m for help): n\r\nPartition type\r\np primary (0 primary, 0 extended, 4 free)\r\ne extended (container for logical partitions)\r\nSelect (default p): p\r\nPartition number (1-4, default 1): 1\r\nFirst sector (2048-2097151, default 2048):\r\nLast sector, +sectors or +size{K,M,G,T,P} (2048-2097151, default 2097151):\r\n\r\nCreated a new partition 1 of type 'Linux' and of size 1023 MiB.\r\n\r\nCommand (m for help): t\r\nSelected partition 1\r\n\r\nPartition type (type L to list all types): 8e\r\nChanged type of partition 'Linux' to 'Linux LVM'.\r\n\r\nCommand (m for help): p\r\nDisk \/dev\/sdb: 1 GiB, 1073741824 bytes, 2097152 sectors\r\nUnits: sectors of 1 * 512 = 512 bytes\r\nSector size (logical\/physical): 512 bytes \/ 512 bytes\r\nI\/O size (minimum\/optimal): 512 bytes \/ 512 bytes\r\nDisklabel type: dos\r\nDisk identifier: 0x980c1049\r\n\r\nDevice Boot Start End Sectors Size Id Type\r\n\/dev\/sdb1 2048 2097151 2095104 1023M 8e Linux LVM\r\n\r\nCommand (m for help): w\r\nThe partition table has been altered.\r\nCalling ioctl() to re-read partition table.\r\nSyncing disks.\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>3.<\/strong> Configure LVM to use `\/dev\/sdb1` as a physical volume.<\/p>\n<pre class=\"\">$ sudo pvcreate \/dev\/sdb1\r\nPhysical volume \"\/dev\/sdb1\" successfully created\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>4.<\/strong> Create a volume group in which the physical volume will reside. We will name this `couchbase`.<\/p>\n<pre class=\"\">$ sudo vgcreate couchbase \/dev\/sdb1\r\nVolume group \"couchbase\" successfully created\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>5.<\/strong> Create a 500MB logical volume named `cbdata` in the `couchbase` volume group.<\/p>\n<pre class=\"\">$ sudo lvcreate -L 500M -n cbdata \/dev\/couchbase\r\nLogical volume \"cbdata\" created.\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>6.<\/strong> Use the `cryptsetup` utility to encrypt the `cbdata` logical volume.<\/p>\n<pre class=\"\">$ sudo cryptsetup --verbose --verify-passphrase luksFormat \/dev\/couchbase\/cbdata\r\n\r\nWARNING!\r\n========\r\nThis will overwrite data on \/dev\/couchbase\/cbdata irrevocably.\r\n\r\nAre you sure? (Type uppercase yes): YES\r\nEnter passphrase:\r\nVerify passphrase:\r\nCommand successful.\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>7.<\/strong> Unlock the encrypted `cbdata` logical volume and make this accessible as a device named `cbdata-luks`.<\/p>\n<pre class=\"\">$ sudo cryptsetup luksOpen \/dev\/couchbase\/cbdata cbdata-luks\r\nEnter passphrase for \/dev\/couchbase\/cbdata:\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>8.<\/strong> Write a filesystem on top of the `cbdata-luks` device.<\/p>\n<pre class=\"\">$ sudo mkfs.ext4 \/dev\/mapper\/cbdata-luks\r\nmke2fs 1.42.13 (17-May-2015)\r\nCreating filesystem with 509952 1k blocks and 127512 inodes\r\nFilesystem UUID: a26d318b-afdd-45ca-857a-063899183ffd\r\nSuperblock backups stored on blocks:\r\n8193, 24577, 40961, 57345, 73729, 204801, 221185, 401409\r\n\r\nAllocating group tables: done\r\nWriting inode tables: done\r\nCreating journal (8192 blocks): done\r\nWriting superblocks and filesystem accounting information: done\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>9.<\/strong> Create a directory at `\/couchbase-data` to mount the filesystem, which will be used for the Couchbase data directory, then mount the filesystem.<\/p>\n<pre class=\"\">$ sudo mkdir \/couchbase-data\r\n$ sudo mount \/dev\/mapper\/cbdata-luks \/couchbase-data\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p><strong>10.<\/strong> Now we have a LUKS encrypted storage device mounted at `\/couchbase-data`, which we use as the target for the Couchbase Server data directory. Verify this with the `mount` and `cryptsetup` commands like so:<\/p>\n<pre class=\"\">$ mount\r\n\u2026\r\n\/dev\/mapper\/cbdata-luks on \/couchbase-data type ext4 (rw,relatime,data=ordered)\r\n<\/pre>\n<pre class=\"\">$ sudo cryptsetup status \/dev\/mapper\/cbdata-luks\r\n\/dev\/mapper\/cbdata-luks is active and is in use.\r\ntype: LUKS1\r\ncipher: aes-xts-plain64\r\nkeysize: 256 bits\r\ndevice: \/dev\/mapper\/couchbase-cbdata\r\noffset: 4096 sectors\r\nsize: 1019904 sectors\r\nmode: read\/write\r\n<\/pre>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<h2>Couchbase 7.0\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcf4\uae30<\/h2>\n<p>Couchbase 7.0\uacfc \ubaa8\ub4e0 \uae30\ub2a5\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uc544\ubcfc \uc900\ube44\uac00 \ub418\uc168\ub098\uc694? \ub2e4\uc74c \ub9ac\uc18c\uc2a4\ub97c \ud655\uc778\ud574 \ubcf4\uc138\uc694:<\/p>\n<p><strong>\ubb38\uc11c<\/strong><\/p>\n<p><a href=\"https:\/\/docs.couchbase.com\/server\/7.0\/introduction\/whats-new.html?ref=blog\" target=\"_blank\" rel=\"noopener\">\ubc84\uc804 7.0\uc758 \uc0c8\ub85c\uc6b4 \uae30\ub2a5<\/a><\/p>\n<p><a href=\"https:\/\/docs.couchbase.com\/server\/7.0\/release-notes\/relnotes.html?ref=blog\" target=\"_blank\" rel=\"noopener\">Couchbase 7.0 \ub9b4\ub9ac\uc2a4 \ub178\ud2b8<\/a><\/p>\n<p><strong>\uad00\ub828 \ube14\ub85c\uadf8 \uac8c\uc2dc\ubb3c<\/strong><\/p>\n<p><a href=\"https:\/\/www.couchbase.com\/blog\/ko\/scopes-and-collections-for-modern-multi-tenant-applications-couchbase-7-0\/?ref=blog\" target=\"_blank\" rel=\"noopener\">\ubc94\uc704 \ubc0f \uceec\ub809\uc158\uc73c\ub85c Couchbase\uc5d0\uc11c \uba40\ud2f0\ud14c\ub10c\ud2b8 \uc571 \ubc30\ud3ec\ub97c \uac04\uc18c\ud654\ud558\ub294 \ubc29\ubc95<\/a><\/p>\n<p><a href=\"https:\/\/www.couchbase.com\/blog\/ko\/couchbase-transactions-with-n1ql\/?ref=blog\" target=\"_blank\" rel=\"noopener\">\uc774\uc81c N1QL \ucffc\ub9ac \uc5b8\uc5b4\uac00 \ubd84\uc0b0 ACID \ud2b8\ub79c\uc7ad\uc158\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4.<\/a><\/p>\n<p><strong>\ub2e4\uc6b4\ub85c\ub4dc \ubc0f \uc9c0\uc6d0<\/strong><\/p>\n<p>\uc5d4\ud130\ud504\ub77c\uc774\uc988 \uc5d0\ub514\uc158 \uace0\uac1d \uc9c0\uc6d0\uc740 \uc77c\ubc18 \uc9c0\uc6d0 \ucc44\ub110\uc744 \ud1b5\ud574 \uc774\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. <a href=\"https:\/\/www.couchbase.com\/blog\/ko\/forums\/?ref=blog\" target=\"_blank\" rel=\"noopener\">\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ud3ec\ub7fc\uc744 \ud1b5\ud574 \ucee4\ubba4\ub2c8\ud2f0 \uc9c0\uc6d0\uc744 \ubc1b\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/a><\/p>\n<div class=\"wp-block-spacer\" style=\"height: 30px\" aria-hidden=\"true\"><\/div>\n<div style=\"text-align: center\"><strong>\uce74\uc6b0\uce58\ubca0\uc774\uc2a4\uc758 \ubcf4\uc548\uc744 \uc9c1\uc811 \ud14c\uc2a4\ud2b8\ud574 \ubcf4\uc138\uc694<br \/><a href=\"https:\/\/www.couchbase.com\/blog\/ko\/downloads\/?ref=blog\" target=\"_blank\" rel=\"noopener\">Couchbase 7 \uccb4\ud5d8\ud574 \ubcf4\uae30<\/a><\/strong><\/div>\n<div class=\"wp-block-spacer\" style=\"height: 15px\" aria-hidden=\"true\"><\/div>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Couchbase now supports LUKS disk encryption to secure your data at rest. How secure is LUKS? Couchbase 7.0 puts a big focus on security, debuting support for both role-based access control (RBAC) for Scopes and Collections, and encryption of at-rest [&hellip;]<\/p>","protected":false},"author":1864,"featured_media":11899,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815,1816,9415,9336,1813,9375],"tags":[1733,1685,9262],"ppma_author":[8928],"class_list":["post-9680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","category-couchbase-server","category-xdcr","category-scopes-and-collections","category-security","category-upgrades","tag-compliance","tag-red-hat","tag-tls-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Secure is LUKS? Encryption + Security at Couchbase<\/title>\n<meta name=\"description\" content=\"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/ko\/at-rest-data-security-with-luks-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase\" \/>\n<meta property=\"og:description\" content=\"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/ko\/at-rest-data-security-with-luks-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T07:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T03:45:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0-social.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"418\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ian McCloy, Director Product Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0-social.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian McCloy, Director Product Management\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/\"},\"author\":{\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\"},\"headline\":\"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase\",\"datePublished\":\"2021-09-09T07:00:41+00:00\",\"dateModified\":\"2025-06-14T03:45:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/\"},\"wordCount\":992,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg\",\"keywords\":[\"compliance\",\"Red Hat\",\"TLS encryption\"],\"articleSection\":[\"Best Practices and Tutorials\",\"Couchbase Server\",\"Cross Data Center Replication (XDCR)\",\"Scopes and Collections\",\"Security\",\"Upgrades\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/\",\"name\":\"How Secure is LUKS? Encryption + Security at Couchbase\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg\",\"datePublished\":\"2021-09-09T07:00:41+00:00\",\"dateModified\":\"2025-06-14T03:45:57+00:00\",\"description\":\"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg\",\"width\":1200,\"height\":628,\"caption\":\"Learn about LUKS disk encryption for securing data at rest, now available in Couchbase Server 7.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19\",\"name\":\"Ian McCloy, Director Product Management, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g\",\"caption\":\"Ian McCloy, Director Product Management, Couchbase\"},\"description\":\"Ian McCloy is the Director of the Platform and Security Product Management Group for Couchbase and lives in the United Kingdom. His dedicated team is responsible for the Reliability, Availability, Serviceability and Security architecture of Couchbase Server and the SaaS Database, Capella. This team also own cloud-native platforms like the Couchbase Kubernetes Autonomous Operator. Ian has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 20 year professional career and holds several patents in the areas of information security, virtualisation and hardware design. https:\/\/www.linkedin.com\/in\/ianmccloy\/\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ianmccloy\/\"],\"url\":\"https:\/\/www.couchbase.com\/blog\/ko\/author\/ian-mccloycouchbase-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Secure is LUKS? Encryption + Security at Couchbase","description":"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/ko\/at-rest-data-security-with-luks-encryption\/","og_locale":"ko_KR","og_type":"article","og_title":"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase","og_description":"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.","og_url":"https:\/\/www.couchbase.com\/blog\/ko\/at-rest-data-security-with-luks-encryption\/","og_site_name":"The Couchbase Blog","article_published_time":"2021-09-09T07:00:41+00:00","article_modified_time":"2025-06-14T03:45:57+00:00","og_image":[{"width":800,"height":418,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0-social.jpeg","type":"image\/jpeg"}],"author":"Ian McCloy, Director Product Management","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0-social.jpeg","twitter_misc":{"Written by":"Ian McCloy, Director Product Management","Est. reading time":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/"},"author":{"name":"Ian McCloy, Director Product Management, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19"},"headline":"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase","datePublished":"2021-09-09T07:00:41+00:00","dateModified":"2025-06-14T03:45:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/"},"wordCount":992,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg","keywords":["compliance","Red Hat","TLS encryption"],"articleSection":["Best Practices and Tutorials","Couchbase Server","Cross Data Center Replication (XDCR)","Scopes and Collections","Security","Upgrades"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/","url":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/","name":"How Secure is LUKS? Encryption + Security at Couchbase","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg","datePublished":"2021-09-09T07:00:41+00:00","dateModified":"2025-06-14T03:45:57+00:00","description":"Get an overview of security options in a Couchbase Server cluster and delve into the specifics of data-at-rest security via LUKS on-disk encryption.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2020\/12\/luks-disk-encryption-data-at-rest-couchbase-server-7-0.jpeg","width":1200,"height":628,"caption":"Learn about LUKS disk encryption for securing data at rest, now available in Couchbase Server 7.0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/at-rest-data-security-with-luks-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure Your Data at Rest with LUKS Disk Encryption in Couchbase"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","description":"NoSQL \ub370\uc774\ud130\ubca0\uc774\uc2a4, Couchbase","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"\uce74\uc6b0\uce58\ubca0\uc774\uc2a4 \ube14\ub85c\uadf8","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/7e8c834bce5128ad6cd764cd1c4cea19","name":"Ian McCloy, \uc81c\ud488 \uad00\ub9ac \uc774\uc0ac, Couchbase","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/97dd714a3242521ce9dcea0d96550c5f","url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","caption":"Ian McCloy, Director Product Management, Couchbase"},"description":"Ian McCloy is the Director of the Platform and Security Product Management Group for Couchbase and lives in the United Kingdom. His dedicated team is responsible for the Reliability, Availability, Serviceability and Security architecture of Couchbase Server and the SaaS Database, Capella. This team also own cloud-native platforms like the Couchbase Kubernetes Autonomous Operator. Ian has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 20 year professional career and holds several patents in the areas of information security, virtualisation and hardware design. https:\/\/www.linkedin.com\/in\/ianmccloy\/","sameAs":["https:\/\/www.linkedin.com\/in\/ianmccloy\/"],"url":"https:\/\/www.couchbase.com\/blog\/ko\/author\/ian-mccloycouchbase-com\/"}]}},"authors":[{"term_id":8928,"user_id":1864,"is_guest":0,"slug":"ian-mccloycouchbase-com","display_name":"Ian McCloy, Director Product Management","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/41f65bee70b5e03e46ae996303a13060d366d405ecb235ff5493d4f1ac3a6f3d?s=96&d=mm&r=g","first_name":"Ian","last_name":"McCloy, Director Product Management","user_url":"","author_category":"","description":"\uc774\uc548 \ub9e5\ud074\ub85c\uc774\ub294 \uce74\uc6b0\uce58\ubca0\uc774\uc2a4\uc758 \ud50c\ub7ab\ud3fc \ubc0f \ubcf4\uc548 \uc81c\ud488 \uad00\ub9ac \uadf8\ub8f9 \ub514\ub809\ud130\ub85c \uc601\uad6d\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.  \uadf8\uc758 \uc804\ub2f4 \ud300\uc740 Couchbase Server\uc640 SaaS \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc778 Capella\uc758 \uc548\uc815\uc131, \uac00\uc6a9\uc131, \uc11c\ube44\uc2a4 \uac00\ub2a5\uc131 \ubc0f \ubcf4\uc548 \uc544\ud0a4\ud14d\ucc98\ub97c \ub2f4\ub2f9\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.  \uc774 \ud300\uc740 \ub610\ud55c Couchbase Kubernetes \uc790\uc728 \uc6b4\uc601\uc790\uc640 \uac19\uc740 \ud074\ub77c\uc6b0\ub4dc \ub124\uc774\ud2f0\ube0c \ud50c\ub7ab\ud3fc\uc744 \uc18c\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.  Ian\uc740 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc5d4\uc9c0\ub2c8\uc5b4, \uae30\uc220 \uc9c0\uc6d0 \uc5d4\uc9c0\ub2c8\uc5b4, \ud488\uc9c8 \ubcf4\uc99d \uc5d4\uc9c0\ub2c8\uc5b4, \uc2dc\uc2a4\ud15c \uad00\ub9ac\uc790 \ub4f1 \ub2e4\uc591\ud55c \uacbd\ub825\uc744 \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. 20\ub144 \uacbd\ub825\uc758 \ub300\ubd80\ubd84\uc744 \uae00\ub85c\ubc8c \uae30\uc220 \ud300\uc744 \uc774\ub04c\uc5c8\uc73c\uba70 \uc815\ubcf4 \ubcf4\uc548, \uac00\uc0c1\ud654 \ubc0f \ud558\ub4dc\uc6e8\uc5b4 \uc124\uacc4 \ubd84\uc57c\uc5d0\uc11c \uc5ec\ub7ec \ud2b9\ud5c8\ub97c \ubcf4\uc720\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. https:\/\/www.linkedin.com\/in\/ianmccloy\/"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/9680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/users\/1864"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/comments?post=9680"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/posts\/9680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media\/11899"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/media?parent=9680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/categories?post=9680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/tags?post=9680"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/ko\/wp-json\/wp\/v2\/ppma_author?post=9680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}