{"id":2396,"date":"2016-09-27T17:28:52","date_gmt":"2016-09-27T17:28:51","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=2396"},"modified":"2023-08-10T23:00:11","modified_gmt":"2023-08-11T06:00:11","slug":"addressing-data-security-concerns-with-couchbase","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","title":{"rendered":"Addressing decentralized data security concerns with Couchbase Mobile"},"content":{"rendered":"<p>In today\u2019s mobile-driven world, there\u2019s an expectation that apps should always work &#8211; with and without an internet connection. Delivering on this expectation requires access and storage of decentralized data directly on device. This is very different from just a few years ago when most data was exclusively stored centralized in the cloud.<\/p>\n<p>Managing decentralized data introduces a number of security risks that are critical to manage. While addressing these risks may be difficult, not addressing them puts mobile users and their data at risk.<\/p>\n<p>Specifically, there are five key security concerns when working with data storage and transport:<\/p>\n<ul>\n<li>User Authentication<\/li>\n<li>Data Read\/Write Access<\/li>\n<li>Data Transport on the Wire<\/li>\n<li>Data Storage on Device<\/li>\n<li>Data Storage in the Cloud<\/li>\n<\/ul>\n<p>\u200bCouchbase Mobile resolves each of these concerns.<\/p>\n<p>For <strong>User Authentication <\/strong>we support pluggable authentication. Out of the box we have support for popular public login providers like Facebook, standard OpenID Connect (OIDC) providers, and you can write your own custom provider. You can also restrict access to the system to successfully authenticated users or optionally allow anonymous users.<\/p>\n<p>For <strong>Data Read\/Write Access<\/strong> there are fine-grained policy tools that allow controlling data access for individual users and roles. Read-side permissions are at the document level and write-side permissions are down to the field level.<\/p>\n<p><strong>Data Transport on the Wire<\/strong>, for data in motion, is over TLS.<\/p>\n<p><strong>Data Storage on Device<\/strong>, for data at rest on device, uses the device\u2019s built in File System Encryption and 256-bit AES full database encryption.<\/p>\n<p><strong>Data Storage in the Cloud<\/strong>, for data at rest in the cloud, you can configure Couchbase Server to use File System Encryption.<\/p>\n<p>Couchbase Mobile allows you to easily manage your data throughout the full network and application stack. This includes storage, access, synchronization, and security in the cloud, on phones, on and tablets, on the web, on your TV, in your car, and everywhere else.<\/p>\n<p>You can learn more and get started with Couchbase Mobile at <a href=\"https:\/\/www.couchbase.com\/developers\/mobile\/\">www.couchbase.com\/developers\/mobile\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s mobile-driven world, there\u2019s an expectation that apps should always work &#8211; with and without an internet connection. Delivering on this expectation requires access and storage of decentralized data directly on device. This is very different from just a [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1810],"tags":[],"ppma_author":[8926],"class_list":["post-2396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-couchbase-mobile"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manage decentralized data risks with Couchbase Mobile<\/title>\n<meta name=\"description\" content=\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing decentralized data security concerns with Couchbase Mobile\" \/>\n<meta property=\"og:description\" content=\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-27T17:28:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T06:00:11+00:00\" \/>\n<meta name=\"author\" content=\"Wayne Carter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wayne Carter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"},\"author\":{\"name\":\"Wayne Carter\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6\"},\"headline\":\"Addressing decentralized data security concerns with Couchbase Mobile\",\"datePublished\":\"2016-09-27T17:28:51+00:00\",\"dateModified\":\"2023-08-11T06:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"},\"wordCount\":341,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Couchbase Mobile\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\",\"name\":\"Manage decentralized data risks with Couchbase Mobile\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2016-09-27T17:28:51+00:00\",\"dateModified\":\"2023-08-11T06:00:11+00:00\",\"description\":\"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing decentralized data security concerns with Couchbase Mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6\",\"name\":\"Wayne Carter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f79f8b1d8e5c0848229fdfdef864713e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g\",\"caption\":\"Wayne Carter\"},\"description\":\"Wayne Carter is Vice President, Engineering at Couchbase, where he is responsible for leading the vision, strategy, and development for the company's mobile, IoT, and edge computing solutions. Before joining Couchbase, Wayne worked as a leader, architect, and engineer at Oracle and Siebel Systems.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/author\/wayne-carter\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Manage decentralized data risks with Couchbase Mobile","description":"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","og_locale":"en_US","og_type":"article","og_title":"Addressing decentralized data security concerns with Couchbase Mobile","og_description":"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.","og_url":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","og_site_name":"The Couchbase Blog","article_published_time":"2016-09-27T17:28:51+00:00","article_modified_time":"2023-08-11T06:00:11+00:00","author":"Wayne Carter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wayne Carter","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"},"author":{"name":"Wayne Carter","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6"},"headline":"Addressing decentralized data security concerns with Couchbase Mobile","datePublished":"2016-09-27T17:28:51+00:00","dateModified":"2023-08-11T06:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"},"wordCount":341,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Couchbase Mobile"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","url":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/","name":"Manage decentralized data risks with Couchbase Mobile","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2016-09-27T17:28:51+00:00","dateModified":"2023-08-11T06:00:11+00:00","description":"Learn how to manage decentralized data security concerns that are critical to manage and how to address them using Couchbase Mobile.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/addressing-data-security-concerns-with-couchbase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Addressing decentralized data security concerns with Couchbase Mobile"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"The Couchbase Blog","description":"Couchbase, the NoSQL Database","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"The Couchbase Blog","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/a1225e506b1304ff54498d69221cb4a6","name":"Wayne Carter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/f79f8b1d8e5c0848229fdfdef864713e","url":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","caption":"Wayne Carter"},"description":"Wayne Carter is Vice President, Engineering at Couchbase, where he is responsible for leading the vision, strategy, and development for the company's mobile, IoT, and edge computing solutions. Before joining Couchbase, Wayne worked as a leader, architect, and engineer at Oracle and Siebel Systems.","url":"https:\/\/www.couchbase.com\/blog\/author\/wayne-carter\/"}]}},"authors":[{"term_id":8926,"user_id":46,"is_guest":0,"slug":"wayne-carter","display_name":"Wayne Carter","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/b94da84aa65383104fad5490bafffd08d0695ab3590039926f11f840c5a8d21b?s=96&d=mm&r=g","author_category":"","last_name":"Carter","first_name":"Wayne","job_title":"","user_url":"","description":"Wayne Carter is Vice President, Engineering at Couchbase, where he is responsible for leading the vision, strategy, and development for the company's mobile, IoT, and edge computing solutions. Before joining Couchbase, Wayne worked as a leader, architect, and engineer at Oracle and Siebel Systems."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts\/2396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/comments?post=2396"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/posts\/2396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/media?parent=2396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/categories?post=2396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/tags?post=2396"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}