{"id":1886,"date":"2015-02-17T12:56:07","date_gmt":"2015-02-17T12:56:07","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=1886"},"modified":"2023-07-20T04:28:29","modified_gmt":"2023-07-20T11:28:29","slug":"data-encryption-in-couchbase-server","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/data-encryption-in-couchbase-server\/","title":{"rendered":"Criptografia de dados no Couchbase Server"},"content":{"rendered":"<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';text-align: left;line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 28px;font-family: 'Trebuchet MS';vertical-align: baseline;background-color: transparent\">Criptografia de dados com o Couchbase Server<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Com cada vez mais dados sendo armazenados no Couchbase, a seguran\u00e7a de Big Data se tornou um t\u00f3pico importante nos dias de hoje. Organiza\u00e7\u00f5es de todos os setores verticais e p\u00fablicos s\u00e3o cada vez mais desafiadas a proteger seus ativos de dados confidenciais ou a enfrentar penalidades severas se n\u00e3o o fizerem. Em um relat\u00f3rio recente sobre amea\u00e7as internas <span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> publicado pela Vormetric, 93% das organiza\u00e7\u00f5es norte-americanas afirmam estar vulner\u00e1veis a amea\u00e7as internas.<\/span><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\"> Criptografia de dados<\/span><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> \u00e9 uma maneira eficaz de impedir o acesso a dados confidenciais e se tornou um importante controle de seguran\u00e7a em muitos padr\u00f5es regulat\u00f3rios, incluindo ataques \u00e0 seguran\u00e7a interna. Este blog abordar\u00e1 os v\u00e1rios n\u00edveis em que voc\u00ea pode proteger os dados confidenciais do seu aplicativo Couchbase. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Criptografia de dados no aplicativo <\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Mesmo antes de os dados chegarem \u00e0 rede e serem enviados ao servidor, voc\u00ea pode criptograf\u00e1-los dentro do seu aplicativo. O modelo de dados do Couchbase permite que voc\u00ea armazene documentos JSON e dados bin\u00e1rios (por exemplo, um blob criptografado). De muitas maneiras, seu aplicativo \u00e9 o melhor lugar para criptografar dados porque ele sabe exatamente se as informa\u00e7\u00f5es s\u00e3o confidenciais ou n\u00e3o e pode aplicar a prote\u00e7\u00e3o seletivamente. Para que seu aplicativo criptografe dados, voc\u00ea precisar\u00e1 de uma chave de criptografia e essa chave deve ser mantida em segredo usando um chaveiro seguro ou em um m\u00f3dulo de seguran\u00e7a de hardware (HSM). Nunca \u00e9 uma boa ideia implementar seu pr\u00f3prio algoritmo de criptografia e, se quiser criptografar dados em seu aplicativo, use uma biblioteca de criptografia padr\u00e3o. Por exemplo, a Vormetric fornece bibliotecas de criptografia de aplicativos<\/span><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> que podem ser usados sem a complexidade e o risco de implementar uma solu\u00e7\u00e3o interna de criptografia e gerenciamento de chaves. \u00a0<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">N\u00e3o se esque\u00e7a de conferir tamb\u00e9m o exemplo de python <\/span><a href=\"https:\/\/gist.github.com\/dodilp\/f6e41f9db09a0e8d2b6f\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">c\u00f3digo<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> para criptografar dados no n\u00edvel do campo no Couchbase. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Criptografia de dados em movimento<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Quando os dados est\u00e3o se movendo entre o cliente e o servidor<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Portanto, quando seus dados est\u00e3o na rede, eles precisam ser protegidos contra um invasor man-in-the-middle que esteja espionando a conex\u00e3o. <\/span><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/developers\/\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">SDKs do Couchbase 2.0<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"> e superiores com o Couchbase Server 3.0 habilitam o acesso a dados criptografados usando SSL para comunica\u00e7\u00f5es cliente-servidor. Sem o SSL (como mostrado na imagem abaixo), uma simples sondagem do wireshark da conex\u00e3o entre o cliente e o servidor pode revelar muitas informa\u00e7\u00f5es confidenciais.<\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Com o SSL ativado, os dados de e para o servidor s\u00e3o criptografados usando o certificado do servidor que est\u00e1 configurado e armazenado no reposit\u00f3rio de certificados do cliente.  \u00c9 uma boa pr\u00e1tica recomendada de seguran\u00e7a regenerar o certificado SSL periodicamente, de acordo com os requisitos de seguran\u00e7a de sua organiza\u00e7\u00e3o.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Al\u00e9m do acesso a dados criptografados, o Couchbase 3.0 tamb\u00e9m inclui suporte para acesso seguro de administrador. Isso permite que os administradores naveguem e administrem com seguran\u00e7a o Couchbase Server por meio do navegador, mesmo em uma rede p\u00fablica.  Ent\u00e3o, qual \u00e9 a apar\u00eancia de uma conex\u00e3o criptografada no wireshark? D\u00ea uma olhada na captura de tela do wireshark abaixo. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\"><img decoding=\"async\" alt=\"Screen Shot 2015-02-16 at 3.12.34 PM.png\" height=\"300px;\" src=\"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI\" style=\"border-style: none\" width=\"624px;\" \/><\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\n\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Quando os dados s\u00e3o movidos entre servidores em um cluster<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Seus dados precisam estar dispon\u00edveis para seus aplicativos 24x7x365. Isso significa que, se um servidor morrer no cluster, seu aplicativo ainda poder\u00e1 acessar seus dados. Para alta disponibilidade, o Couchbase replica os dados dentro do cluster e entre os datacenters - dentro de um cluster, cada documento armazenado no Couchbase pode ser replicado at\u00e9 3 vezes.  Se todos os seus dados confidenciais j\u00e1 estiverem criptografados nos documentos, as c\u00f3pias de r\u00e9plica ser\u00e3o transmitidas como est\u00e3o e armazenadas (ou seja, criptografadas). Para aumentar a seguran\u00e7a, \u00e9 uma boa pr\u00e1tica usar IPSec na rede entre os n\u00f3s do servidor Couchbase.<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 12px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Quando os dados est\u00e3o se movendo entre datacenters<\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Se voc\u00ea tiver data centers em diferentes regi\u00f5es geogr\u00e1ficas e estiver preocupado com o fluxo de dados confidenciais entre eles, poder\u00e1 usar o recurso XDCR (Cross Datacenter Replication) seguro no Couchbase.   O XDCR seguro permite criptografar o tr\u00e1fego entre dois data centers usando uma conex\u00e3o SSL. Quando voc\u00ea usa o XDCR (Secure Cross Datacenter Replication), todo o tr\u00e1fego nos data centers de origem e destino ser\u00e1 criptografado. Isso causar\u00e1 um pequeno aumento na carga da CPU, pois qualquer criptografia precisa de ciclos adicionais de CPU. \u00c9 uma boa pr\u00e1tica de seguran\u00e7a alternar periodicamente os certificados XDCR de acordo com as pol\u00edticas de seguran\u00e7a de sua organiza\u00e7\u00e3o. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;font-weight: bold;vertical-align: baseline;background-color: transparent\">Criptografia de dados no disco <\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">A Vormetric oferece uma solu\u00e7\u00e3o de criptografia transparente, avan\u00e7ada e orientada por pol\u00edticas para o Couchbase Server. Com a Vormetric, os dados confidenciais no Couchbase ser\u00e3o criptografados em repouso no disco. Isso garante que seus dados n\u00e3o ser\u00e3o comprometidos se o banco de dados for roubado, copiado, perdido ou acessado de forma inadequada. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38;text-align: justify\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">A solu\u00e7\u00e3o envolve agentes da Vormetric instalados na camada de armazenamento, que criptografam os dados de forma transparente.  Os agentes conversam com um gerenciador de seguran\u00e7a de dados distribu\u00eddo que pode ser um dispositivo f\u00edsico\/virtual e \u00e9 respons\u00e1vel pelo armazenamento seguro das chaves de criptografia. O Couchbase l\u00ea e grava informa\u00e7\u00f5es confidenciais na camada de armazenamento sem nenhuma altera\u00e7\u00e3o no aplicativo ou no banco de dados. <\/span><\/span><\/p>\n<p style=\"font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 20.7999992370605px;text-align: left\">\u00a0<\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\"><img decoding=\"async\" alt=\"Screen Shot 2015-02-16 at 3.28.05 PM.png\" height=\"315px;\" src=\"https:\/\/lh6.googleusercontent.com\/iPQm9CL96Tfik55TuDM-BO8MOqDXappB-WJKhGbhprCZvXlZCarKTU_1TloJSGhpqFrdDx6YmtKIEZ3M32F9u-4u6h7hxLSG8ptx-01mvPKCKRR4qi6CX_f_j3fL0sWDNl0\" style=\"border-style: none\" width=\"374px;\" \/><\/span><\/span><\/p>\n<p dir=\"ltr\" style=\"margin-top: 0pt;margin-bottom: 0pt;font-family: sans-serif, Arial, Verdana, 'Trebuchet MS';text-align: left;line-height: 1.38\"><span id=\"docs-internal-guid-4d5cec61-94de-ead3-d5f9-2909a652bcc3\"><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">Para saber mais sobre como a Vormetric e o Couchbase trabalham juntos, n\u00e3o se esque\u00e7a de se registrar em nosso <\/span><a href=\"https:\/\/w.on24.com\/r.htm?e=942985&amp;s=1&amp;k=CA9E4BFFEDEFC9FE70ADA44901836DB9\" style=\"text-decoration: none\"><span style=\"font-size: 15px;font-family: Arial;text-decoration: underline;vertical-align: baseline;background-color: transparent\">pr\u00f3ximo webinar ao vivo<\/span><\/a><span style=\"font-size: 15px;font-family: Arial;vertical-align: baseline;background-color: transparent\">.<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]<\/p>","protected":false},"author":4,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"ppma_author":[8972],"class_list":["post-1886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data encryption in Couchbase Server - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/data-encryption-in-couchbase-server\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data encryption in Couchbase Server\" \/>\n<meta property=\"og:description\" content=\"Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/data-encryption-in-couchbase-server\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-17T12:56:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T11:28:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI\" \/>\n<meta name=\"author\" content=\"Don Pinto, Principal Product Manager, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Don Pinto, Principal Product Manager, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/\"},\"author\":{\"name\":\"Don Pinto, Principal Product Manager, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c\"},\"headline\":\"Data encryption in Couchbase Server\",\"datePublished\":\"2015-02-17T12:56:07+00:00\",\"dateModified\":\"2023-07-20T11:28:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/\"},\"wordCount\":804,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/\",\"name\":\"Data encryption in Couchbase Server - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2015-02-17T12:56:07+00:00\",\"dateModified\":\"2023-07-20T11:28:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data encryption in Couchbase Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c\",\"name\":\"Don Pinto, Principal Product Manager, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/39c6d6178c73f0dc09af63f930a4f37d\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g\",\"caption\":\"Don Pinto, Principal Product Manager, Couchbase\"},\"description\":\"Don Pinto is a Principal Product Manager at Couchbase and is currently focused on advancing the capabilities of Couchbase Server. He is extremely passionate about data technology, and in the past has authored several articles on Couchbase Server including technical blogs and white papers. Prior to joining Couchbase, Don spent several years at IBM where he maintained the role of software developer in the DB2 information management group and most recently as a program manager on the SQL Server team at Microsoft. Don holds a master's degree in computer science and a bachelor's in computer engineering from the University of Toronto, Canada.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/don-pinto\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data encryption in Couchbase Server - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/data-encryption-in-couchbase-server\/","og_locale":"pt_BR","og_type":"article","og_title":"Data encryption in Couchbase Server","og_description":"Data Encryption with Couchbase Server With more and more data being stored in Couchbase, big data security is become a hot topic these days. Organization across all verticals and public sectors are increasingly challenged to protect their sensitive data assets, [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/data-encryption-in-couchbase-server\/","og_site_name":"The Couchbase Blog","article_published_time":"2015-02-17T12:56:07+00:00","article_modified_time":"2023-07-20T11:28:29+00:00","og_image":[{"url":"https:\/\/lh4.googleusercontent.com\/wTUevgDdPALlNWqk1jl-p3ixRM1Pk2-jKC10QJV8kpXDJiO4pWDYid4SDUkXlNhmR1LHdYMdx__FU7NECqWjhGP90nAeOqb8AD5KJ1Ps2FIkLb74csh5lUfhSH1Ac0JIWvI","type":"","width":"","height":""}],"author":"Don Pinto, Principal Product Manager, Couchbase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Don Pinto, Principal Product Manager, Couchbase","Est. reading time":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"},"author":{"name":"Don Pinto, Principal Product Manager, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c"},"headline":"Data encryption in Couchbase Server","datePublished":"2015-02-17T12:56:07+00:00","dateModified":"2023-07-20T11:28:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"},"wordCount":804,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/","url":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/","name":"Data encryption in Couchbase Server - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2015-02-17T12:56:07+00:00","dateModified":"2023-07-20T11:28:29+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/data-encryption-in-couchbase-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data encryption in Couchbase Server"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/eb130a1e0278989e089a7fbbf8bc754c","name":"Don Pinto, gerente principal de produtos da Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/39c6d6178c73f0dc09af63f930a4f37d","url":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","caption":"Don Pinto, Principal Product Manager, Couchbase"},"description":"Don Pinto \u00e9 gerente de produto principal da Couchbase e atualmente est\u00e1 concentrado no avan\u00e7o dos recursos do Couchbase Server. Ele \u00e9 extremamente apaixonado por tecnologia de dados e, no passado, foi autor de v\u00e1rios artigos sobre o Couchbase Server, incluindo blogs t\u00e9cnicos e white papers. Antes de ingressar no Couchbase, Don passou v\u00e1rios anos na IBM, onde ocupou a fun\u00e7\u00e3o de desenvolvedor de software no grupo de gerenciamento de informa\u00e7\u00f5es DB2 e, mais recentemente, como gerente de programa na equipe do SQL Server na Microsoft. Don tem mestrado em ci\u00eancia da computa\u00e7\u00e3o e \u00e9 bacharel em engenharia da computa\u00e7\u00e3o pela Universidade de Toronto, no Canad\u00e1.","url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/don-pinto\/"}]}},"authors":[{"term_id":8972,"user_id":4,"is_guest":0,"slug":"don-pinto","display_name":"Don Pinto, Principal Product Manager, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/574759a111515cb8c5d5a1f5268d2759050bd8383654dc0d9393324f0c35fae0?s=96&d=mm&r=g","first_name":"Don","last_name":"Pinto, Principal Product Manager, Couchbase","user_url":"","author_category":"","description":"Don Pinto \u00e9 gerente de produto principal da Couchbase e atualmente est\u00e1 concentrado no avan\u00e7o dos recursos do Couchbase Server. Ele \u00e9 extremamente apaixonado por tecnologia de dados e, no passado, foi autor de v\u00e1rios artigos sobre o Couchbase Server, incluindo blogs t\u00e9cnicos e white papers. Antes de ingressar no Couchbase, Don passou v\u00e1rios anos na IBM, onde ocupou a fun\u00e7\u00e3o de desenvolvedor de software no grupo de gerenciamento de informa\u00e7\u00f5es DB2 e, mais recentemente, como gerente de programa na equipe do SQL Server na Microsoft. Don tem mestrado em ci\u00eancia da computa\u00e7\u00e3o e \u00e9 bacharel em engenharia da computa\u00e7\u00e3o pela Universidade de Toronto, no Canad\u00e1."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/1886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=1886"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/1886\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=1886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=1886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=1886"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=1886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}