Encryption

Data-in-Transit Encryption

MariaDB Cloud features data-in-transit encryption by default.

Client-to-Server

By default, MariaDB Cloud services feature data-in-transit encryption for client connections: TLS 1.2 and TLS 1.3 are supported. SSL/TLS certificates and encryption settings are not customer-configurable.

For information on how to connect with TLS, see "Connect and Query"arrow-up-right.

The "Disable SSL/TLS" option may be appropriate for some customers when also using AWS PrivateLink or GCP VPC Peering.

Server-to-Server

MariaDB Cloud services perform server-to-server communication between MariaDB MaxScale, MariaDB Server, and MariaDB Cloud infrastructure.

By default, these server-to-server communications are protected with data-in-transit encryption:

For MariaDB Cloud Services on AWS, see "Encryption in transit(AWS)arrow-up-right". MariaDB Cloud uses configurations, which feature automatic in-transit encryption.

For MariaDB Cloud Services on GCP, see "Encryption in transit (GCP)arrow-up-right". MariaDB Cloud uses encryption by default.

For MariaDB Cloud Services on Azure, see "Encryption in transit (Azure)arrow-up-right". MariaDB Cloud uses encryption by default.

Data-at-Rest Encryption

MariaDB Cloud features transparent data-at-rest encryption.

MariaDB Cloud Services on AWS use Amazon EBS encryptionarrow-up-right.

MariaDB Cloud Services on GCP benefits from encryption by defaultarrow-up-right.

MariaDB Cloud Services on Azure use Azure Disk Encryptionarrow-up-right.

Last updated

Was this helpful?