Queryable Encryption gives you the ability to perform the following tasks:
Encrypt sensitive data fields from the client-side.
Store sensitive data fields as fully randomized encrypted data on the database server-side.
Run expressive queries on the encrypted data.
These tasks are all completed without the server having knowledge of the data it's processing.
Sensitive data is encrypted throughout its lifecycle - in-transit, at-rest, in-use, in logs, and backups - and only ever decrypted on the client-side, since only you have access to the encryption keys.
Queryable Encryption introduces an industry-first fast, searchable encryption scheme developed by the pioneers in encrypted search. The feature supports equality searches, with additional query types such as range, prefix, suffix, and substring planned for future releases.
You can set up Queryable Encryption using the following mechanisms:
Automatic Encryption: Enables you to perform encrypted read and write operations without you having to write code to specify how to encrypt fields.
Explicit Encryption: Enables you to perform encrypted read and write operations through your MongoDB driver's encryption library. You must specify the logic for encryption with this library throughout your application.
The following table shows which MongoDB server products support which CSFLE mechanisms:
Supports Automatic Encryption
Supports Explicit Encryption
MongoDB Enterprise Advanced
MongoDB Community Edition
To learn which MongoDB drivers support Queryable Encryption, see Queryable Encryption Compatibility.
To learn about the security benefits of Queryable Encryption for your applications, see the Features page.
To learn what you must install to use Queryable Encryption, see the Installation Requirements page.
To start using Queryable Encryption, see the Quick Start.
To learn how Queryable Encryption works and how to set it up, see the Fundamentals section.
The fundamentals section contains the following pages:
To learn how to perform specific tasks with Queryable Encryption, see the Tutorials section.
To view information to help you develop your Queryable Encryption enabled applications, see the Reference section.
The reference section contains the following pages: