{"id":11179,"date":"2021-05-20T08:10:20","date_gmt":"2021-05-20T15:10:20","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=11179"},"modified":"2021-05-19T18:02:27","modified_gmt":"2021-05-20T01:02:27","slug":"why-data-encryption-is-essential-2","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","title":{"rendered":"Why Data Encryption Is Essential"},"content":{"rendered":"<h4><i><span style=\"font-weight: 400;\">This article aims to bring awareness around the importance of data encryption, considering the astounding rate at which data is being produced, transmitted and consumed. We will discuss the need for data protection, regulation, and some encryption best practices.<\/span><\/i><\/h4>\n<p><span style=\"font-weight: 400;\">Organizations of all sizes across the globe <\/span><span style=\"font-weight: 400;\">are dealing with a staggering volume of data, ranging from personally identifiable information (PII) to protected health information (PHI), financial records, and other sensitive information that can quickly get out of control if not governed properly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data privacy protection is becoming a priority for individuals, organizations and governments alike. As governments work to get protection of data privacy rights under control, organizations are reconsidering how they collect, store and process personal information. Data encryption is one thing that can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><b>What is data encryption?<\/b><\/span><\/h5>\n<p><b>Data encryption<\/b><span style=\"font-weight: 400;\"> is a process in which plaintext information is scrambled into incomprehensible text known as cipher-text, using cryptographic modules known as secret keys that only authorized parties can understand. On the other hand, decryption is the process of converting cipher-text back to plaintext data using the same secret key.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are two main kinds of data encryption standard: symmetric and asymmetric.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11207 size-full\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/Encryption-blog-05.png\" alt=\"Arrows pointing left and right towards documents with a key in between, signifying the way symmetric encryption works\" width=\"592\" height=\"333\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05.png 592w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05-300x169.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-05-20x11.png 20w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/p>\n<p><em><span style=\"font-weight: 400;\">In symmetric encryption, developers use only one secret key for both encryption and decryption.<\/span><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11208 size-full\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/Encryption-blog-04.png\" alt=\"Two arrows pointing different directions and a key above each one, representing how asymmetric data encryption works\" width=\"592\" height=\"333\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04.png 592w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04-300x169.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/Encryption-blog-04-20x11.png 20w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/p>\n<p><em><span style=\"font-weight: 400;\">In asymmetric encryption, developers use two keys: a public key and a private key. There\u2019s a public encryption key for anyone to use and a private decryption key that must be kept secret. Developers generally prefer asymmetric encryption over the wire &#8212; also known as \u201cdata encryption in transit\u201d &#8212; using protocols like SSL and TLS.<\/span><\/em><\/p>\n<h5><span style=\"color: #333399;\"><b>Why data encryption is essential<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">Let\u2019s take a look at some data breaches that occurred during <\/span><b>2020.<\/b><\/p>\n<p><b>January 22: <\/b><span style=\"font-weight: 400;\">A customer support database holding over 280 million Microsoft customer records was left unprotected on the web. <\/span><a href=\"https:\/\/www.zdnet.com\/article\/microsoft-discloses-security-breach-of-customer-support-database\/\"><span style=\"font-weight: 400;\">Microsoft\u2019s exposed database<\/span><\/a><span style=\"font-weight: 400;\"> disclosed email addresses, IP addresses, and support case details. Microsoft says the database did not include any other personal information.<\/span><\/p>\n<p><b>February 11: <\/b><a href=\"https:\/\/www.cincinnati.com\/story\/money\/2020\/02\/11\/fifth-third-data-breach-consumer-federation-america-slams\/4722455002\/\"><span style=\"font-weight: 400;\">Fifth Third Bank<\/span><\/a><span style=\"font-weight: 400;\">, a financial institution with 1,150 branches in 10 US states, claims a former employee was responsible for a data breach that exposed customer names, Social Security numbers, driver\u2019s license information, mother\u2019s maiden names, addresses, phone numbers, date of birth, and account numbers. The total number of affected employees and banking clients remains undisclosed.<\/span><\/p>\n<p><b>April 6:<\/b><span style=\"font-weight: 400;\"> A digital wallet app,<\/span> <a href=\"https:\/\/securityboulevard.com\/2020\/04\/data-leak-private-information-of-14-million-key-ring-users-exposed\/\"><span style=\"font-weight: 400;\">Key Ring<\/span><\/a><span style=\"font-weight: 400;\">, stored customer data of 14 million users in an unsecured database. The app allows users to easily upload and store scans and photos of membership and loyalty cards to a digital folder in their mobile device. The exposed data included names, full credit card details (including CVV numbers), email address, birth date, address, membership ID numbers, retail club and loyalty card memberships, government IDs, gift cards, medical insurance cards, medical marijuana IDs, IP address and encrypted passwords.<\/span><\/p>\n<p><b>June 23: <\/b><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/techcrunch.com\/2020\/06\/23\/twitter-says-some-business-users-had-their-pivate-data-exposed\/\"><span style=\"font-weight: 400;\">security lapse at Twitter<\/span><\/a><span style=\"font-weight: 400;\"> exposed an undisclosed number of business users&#8217; account information, including email addresses, phone numbers, and the last four digits of their credit card numbers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is not a comprehensive list, but it gives us an idea of the scale at which data breaches can occur, irrespective of the size, location, and type of organization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/RZAX14GX\"><span style=\"font-weight: 400;\">IBM Cost of Data Breach Report 2020<\/span><\/a><span style=\"font-weight: 400;\">, the average cost of data breach in the United States alone is $8.64M. Most of these attacks expose customer PII, costing businesses an average of $150 per stolen record. Add to this indirect costs such as\u00a0<\/span><span style=\"font-weight: 400;\">bad publicity and loss of consumer confidence. Data breaches can impact sales for years to come.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overwhelming? <\/span><span style=\"font-weight: 400;\">This is where data encryption can make a difference.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><strong>A strong encryption:<\/strong><\/span><\/h5>\n<ul>\n<li><span style=\"font-weight: 400;\">Ensures <\/span><b>Data Privacy<\/b><span style=\"font-weight: 400;\"> &#8211; No one but the rightful data owner can see actual data. The encrypted cipher-text is simply gibberish to unauthorized users. <\/span><\/li>\n<li>Provides <b>Data Security<\/b> &#8211; Proper encryption protects data in transit (over the wire) and data at rest. This is crucial in the event of a compromised network or a stolen physical storage disk.<\/li>\n<li>Maintains <b>Data Integrity <\/b>&#8211; In the case of <a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2020\/fact-sheet-man-in-the-middle-attacks\/\">man-in-the middle attacks<\/a>, encryption (along with other security measures) ensures that data is not tampered with.<\/li>\n<li><b>Authenticates <\/b>the origin of data, thereby assisting in sender verification.<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This is all good to know, but is encryption mandatory? Is there any governance? Do <\/span><a href=\"https:\/\/www.thesslstore.com\/blog\/10-data-privacy-and-encryption-laws-every-business-needs-to-know\/\"><span style=\"font-weight: 400;\">data privacy laws, regulations<\/span><\/a><span style=\"font-weight: 400;\"> and standards explicitly call for encryption? To get answers to these questions, let\u2019s look at today&#8217;s most prevalent data privacy laws and standards.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Health Insurance Portability and Accountability Act of 1996 (<\/span><a href=\"https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html\"><span style=\"font-weight: 400;\">HIPAA<\/span><\/a><span style=\"font-weight: 400;\">) is a US federal law that requires the creation of national standards to protect sensitive patient health information (PHI) from being disclosed without the patient&#8217;s consent or knowledge. HIPAA requires organizations and covered entities to protect PHI for every patient. Regulators demand organizations <\/span>encrypt their data unless they can justify why they can\u2019t implement encryption and can provide an equivalent alternative.<\/p>\n<p><span style=\"font-weight: 400;\">The Payment Card Industry Data Security Standard (<\/span><a href=\"https:\/\/www.pcisecuritystandards.org\"><span style=\"font-weight: 400;\">PCI DSS<\/span><\/a><span style=\"font-weight: 400;\">) was developed to secure and protect the entire payment card ecosystem. This standard requires companies to encrypt payment card data in transit and at rest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The General Data Protection Regulation (<\/span><a href=\"https:\/\/gdpr-info.eu\/\"><span style=\"font-weight: 400;\">GDPR<\/span><\/a><span style=\"font-weight: 400;\">) is a law on data protection and privacy in the European Union and the European Economic Area. Its primary aim is to give individuals control over their personal data and to simplify the EU regulatory environment. GDPR requires organizations to incorporate encryption and thereby mitigate the risks associated with a data breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The California Consumer Privacy Act (<\/span><a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB1121\"><span style=\"font-weight: 400;\">CCPA<\/span><\/a><span style=\"font-weight: 400;\">) is a state-wide data privacy law that regulates how businesses all over the world are allowed to handle the personal information (PI) of California residents. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Governing organizations have proven willing to fine organizations for data breaches, especially when incidents involve \u201cnon-encrypted or non-redacted personal information\u201d.\u00a0 Regulators are more likely to waive responsibility when organizations make an effort to use encryption. They may also forgive when affected data is of no use without the decryption key.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><b>Data encryption best practices:<\/b><\/span><\/h5>\n<p><span style=\"font-weight: 400;\">Now that we know what encryption is, how it works, how it can mitigate damage, and the different regulations around it, let\u2019s look at the <\/span><span style=\"font-weight: 400;\">best ways to implement data encryption to avoid mishaps and loopholes that can make your organization vulnerable to a data breach.\u00a0<\/span><\/p>\n<p><strong>Here are some recommended practices:<\/strong><\/p>\n<ul>\n<li><b>Work with stakeholders <\/b>Identify all stakeholders and establish their roles in securing data, especially those who have actual data access. Next, identify what information needs protecting. This is a very important step towards securing your data.<\/li>\n<li><b>Identify the encryption tool <\/b>whatever secret key \/ encryption algorithm you choose\u00a0 should follow established standards and frameworks such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Federal_Information_Processing_Standards\">FIPS<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27000-series\">ISO\/IEC 27000<\/a>, or <a href=\"https:\/\/en.wikipedia.org\/wiki\/NIST_Cybersecurity_Framework\">NIST<\/a>, such that a third party is unlikely to break the cipher-text by<a href=\"https:\/\/en.wikipedia.org\/wiki\/Brute-force_attack\"> brute force<\/a>.<b><i> \u00a0<\/i><\/b><\/li>\n<li><b>Secure encryption keys <\/b>securing your keys to keep them out of the hands of unauthorized users is critical. Here are some basic steps to protect your keys:<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Separate encrypted data from keys.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don&#8217;t store the key in a plaintext file.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide privileges only to authorized users.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Rotate keys on a regular basis.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Protect data at all times <\/b>Organizations must plan to protect data in transit and at rest. To enable data encryption at rest, encrypt sensitive files prior to storing them and\/or encrypt the storage media itself. To protect data in transit, they can install SSL\/TLS certificates on their servers.<\/li>\n<\/ul>\n<h5><strong><span style=\"color: #333399;\">Conclusion\u00a0<\/span><\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">Data encryption is an important part of information security. The consequences of a data breach can be wide-ranging: from regulatory penalties to economic losses. <\/span><span style=\"font-weight: 400;\">Adopting encryption as a best practice is the simplest and most effective way for organizations to mitigate these impacts .<\/span><span style=\"font-weight: 400;\">We hope this article has given you some information about the importance of encryption and the governance around it, and helped you make some important decisions about information security.<\/span><\/p>\n<h5><span style=\"color: #333399;\"><strong>References<\/strong><\/span><\/h5>\n<p><a href=\"https:\/\/www.identityforce.com\/blog\/2020-data-breaches\"><span style=\"font-weight: 400;\">https:\/\/www.identityforce.com\/blog\/2020-data-breaches<\/span><\/a><\/p>\n<p><a href=\"https:\/\/securityboulevard.com\/2020\/03\/understanding-data-encryption-requirements-for-gdpr-ccpa-lgpd-hipaa\/\"><span style=\"font-weight: 400;\">https:\/\/securityboulevard.com\/2020\/03\/understanding-data-encryption-requirements-for-gdpr-ccpa-lgpd-hipaa\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.securitymetrics.com\/blog\/what-are-12-requirements-pci-dss-compliance\"><span style=\"font-weight: 400;\">https:\/\/www.securitymetrics.com\/blog\/what-are-12-requirements-pci-dss-compliance<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article aims to bring awareness around the importance of data encryption, considering the astounding rate at which data is being produced, transmitted and consumed. We will discuss the need for data protection, regulation, and some encryption best practices. Organizations [&hellip;]<\/p>\n","protected":false},"author":58641,"featured_media":11209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1815],"tags":[1666,2135],"ppma_author":[9111],"class_list":["post-11179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices-and-tutorials","tag-encryption","tag-gdpr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Data Encryption Is Essential - The Couchbase Blog<\/title>\n<meta name=\"description\" content=\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Data Encryption Is Essential\" \/>\n<meta property=\"og:description\" content=\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T15:10:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/essential-encryption-blogbanner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1575\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arun Vijayraghavan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arun Vijayraghavan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/\"},\"author\":{\"name\":\"Arun Vijayraghavan\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/159f967ae0328d6bd25d6389be35e843\"},\"headline\":\"Why Data Encryption Is Essential\",\"datePublished\":\"2021-05-20T15:10:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/\"},\"wordCount\":1314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2021\\\/05\\\/essential-encryption-blogbanner.jpg\",\"keywords\":[\"Encryption\",\"gdpr\"],\"articleSection\":[\"Best Practices and Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/\",\"name\":\"Why Data Encryption Is Essential - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2021\\\/05\\\/essential-encryption-blogbanner.jpg\",\"datePublished\":\"2021-05-20T15:10:20+00:00\",\"description\":\"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2021\\\/05\\\/essential-encryption-blogbanner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/1\\\/2021\\\/05\\\/essential-encryption-blogbanner.jpg\",\"width\":1575,\"height\":628,\"caption\":\"A padlock on a black wooden surface, representing the importance of protecting information with data encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/why-data-encryption-is-essential-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Data Encryption Is Essential\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/#\\\/schema\\\/person\\\/159f967ae0328d6bd25d6389be35e843\",\"name\":\"Arun Vijayraghavan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g042b27309bc3f10ef696264d6a250a75\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g\",\"caption\":\"Arun Vijayraghavan\"},\"description\":\"Arun Vijayraghavan is the Principal Product Manager for SDK and Connectors at Couchbase. As a customer obsessed product leader, he strives to shape the future of products, making critical decisions between performance, features, and time-to-market. He has a demonstrated ability and an established track record of over 20 years of providing strategic guidance to companies to launch developer platforms and new products in order to pull together the single vision of maximizing business value of the product. Arun holds dual master degree's in Physics and Information Technology.\",\"sameAs\":[\"https:\\\/\\\/www.couchbase.com\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/avijayraghavan\\\/\"],\"url\":\"https:\\\/\\\/www.couchbase.com\\\/blog\\\/author\\\/arun-vijayraghavan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Data Encryption Is Essential - The Couchbase Blog","description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","og_locale":"en_US","og_type":"article","og_title":"Why Data Encryption Is Essential","og_description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","og_url":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","og_site_name":"The Couchbase Blog","article_published_time":"2021-05-20T15:10:20+00:00","og_image":[{"width":1575,"height":628,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2021\/05\/essential-encryption-blogbanner.jpg","type":"image\/jpeg"}],"author":"Arun Vijayraghavan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arun Vijayraghavan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"},"author":{"name":"Arun Vijayraghavan","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843"},"headline":"Why Data Encryption Is Essential","datePublished":"2021-05-20T15:10:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"},"wordCount":1314,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","keywords":["Encryption","gdpr"],"articleSection":["Best Practices and Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","url":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/","name":"Why Data Encryption Is Essential - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","datePublished":"2021-05-20T15:10:20+00:00","description":"Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. \u2713 Do more with Couchbase.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2021\/05\/essential-encryption-blogbanner.jpg","width":1575,"height":628,"caption":"A padlock on a black wooden surface, representing the importance of protecting information with data encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/why-data-encryption-is-essential-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Data Encryption Is Essential"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"The Couchbase Blog","description":"Couchbase, the NoSQL Database","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"The Couchbase Blog","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/159f967ae0328d6bd25d6389be35e843","name":"Arun Vijayraghavan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g042b27309bc3f10ef696264d6a250a75","url":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","caption":"Arun Vijayraghavan"},"description":"Arun Vijayraghavan is the Principal Product Manager for SDK and Connectors at Couchbase. As a customer obsessed product leader, he strives to shape the future of products, making critical decisions between performance, features, and time-to-market. He has a demonstrated ability and an established track record of over 20 years of providing strategic guidance to companies to launch developer platforms and new products in order to pull together the single vision of maximizing business value of the product. Arun holds dual master degree's in Physics and Information Technology.","sameAs":["https:\/\/www.couchbase.com","https:\/\/www.linkedin.com\/in\/avijayraghavan\/"],"url":"https:\/\/www.couchbase.com\/blog\/author\/arun-vijayraghavan\/"}]}},"acf":[],"authors":[{"term_id":9111,"user_id":58641,"is_guest":0,"slug":"arun-vijayraghavan","display_name":"Arun Vijayraghavan","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/c4ecf222f7ec7d1f7bb6305543ab979690ed30f98bbc8fa806ffca5bf8cf3dd8?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts\/11179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/users\/58641"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/comments?post=11179"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts\/11179\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/media\/11209"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/media?parent=11179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/categories?post=11179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/tags?post=11179"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=11179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}