Learn about our cloud-native data integration experience.
Learn about our cloud-native data integration experience.
Learn about the key cloud database companies
Learn about the key cloud database companies
Watch new videos from customers, partners, and MarkLogic in a new content hub built on DHS.
Just because protecting and securing your data against today’s cyber threats is critical doesn’t mean you have to limit access. With MarkLogic you can have fine-grained access controls, proper separation of duties, and the ability to anonymize data so that your data is both secure and shareable.
Out of the box, MarkLogic provides you with the industry-leading security you need. But your organization may require the Advanced Security option, which includes three additional capabilities:
“There’s a whole new way of defining security and what it means to have data ownership.”
“Element Level Security: There’s a whole new way of defining security and what it means to have data ownership. You can have shared infrastructure, and I can define security models in a way where different groups in the organization can have access to their own data, but we still have one copy of the data.”
MarkLogic interoperates with third-party KMS systems, including Amazon Web Services (AWS) Key Management Service (KMS) and others such as Gemalto’s SafeNet. These external KMS systems securely manage authentication keys used by the self-encrypting disks in your storage system. This extra layer of security includes:
To implement, a MarkLogic security administrator creates redaction policies that contain rules defining which sensitive information should be redacted, and then chooses which policy to apply when running an export. Administrators can combine built-in or custom rules into policies to match different target needs
Built-in functions for different types of redaction include:
All rules and actions taken by users are logged, ensuring all export activity can be audited later on
Redaction is designed to be used when running large bulk exports. And, by utilizing the MarkLogic Content Pump (mlcp), it’s faster and more secure than solutions implemented at the application layer
“We need to have a sense of unified data available, govern it properly, and apply security to make sure that we can share that knowledge throughout our organization. So, we are utilizing MarkLogic to break away from the silo approach—we have a unified sense of data and can also enforce proper controls over it and empower our employees to access the data.”
Compartment Security provides additional security control to specify that a user must have all of the right roles to interact with a document rather than just one of the right roles using AND semantics or OR semantics.
In MarkLogic, a compartment is a name associated with a role. When a role is compartmented, the compartment name is used as an additional check when determining a user’s authority to access or create documents in a database. Without compartment security, permissions are checked using OR semantics.
For example, if a document has read permission for role1 and read permission for role2, a user who possesses either role1 or role2 can read that document. If those roles have different compartments associated with them (for example, compartment1 and compartment2, respectively), then the permissions are checked using AND semantics for each compartment, as well as OR semantics for each non-compartmented role. To access the document, if role1 and role2 are in different compartments, a user must possess both role1 and role2 to access the document, as well as a non-compartmented role that has a corresponding permission on the document.
Be the first to know! News, product information, and events delivered straight to your inbox.
By continuing to use this website you are giving consent to cookies being used in accordance with the MarkLogic Privacy Statement.