Encrypting Your Data

      +
      A practical guide for getting started with Field-Level Encryption, showing how to encrypt and decrypt JSON fields using the Java SDK.

      For a high-level overview of this feature, see Field Level Encryption.

      Native Encryption at Rest

      Server 8.x (and new Capella Operational clusters) offer encryption at rest. It’s a comprehensive way of encrypting all data in a non-ephemeral bucket, as well as logs, configuration data, and audit data. However, you may prefer the relative simplicity of key management in Field Level Encryption for use cases where there are a limited number of data to be encrypted.

      Packaging

      The Couchbase Java SDK works together with the Java Couchbase Encryption library to provide support for encryption and decryption of JSON fields. This library makes use of the cryptographic algorithms available on your platform, and provides a framework for implementing your own crypto components.

      The encryption code is packaged as an optional library and is subject to the Couchbase License and Enterprise Subscription License agreements. To use the encryption library, you have to explicitly include this dependency in your project configuration. Refer to the dependencies section.

      Requirements

      • Couchbase Java SDK version 3.0.5 or later.

      • Java Couchbase Encryption version 3.0.0 or later.

      Maven Coordinates

      <dependency>
          <groupId>com.couchbase.client</groupId>
          <artifactId>couchbase-encryption</artifactId>
          <version>${version}</version>
      </dependency>

      See the GitHub repository tags for the latest version.

      Optional Dependencies

      To reduce the footprint of this library, some of its dependencies are optional. Using certain features requires adding additional dependencies to your project.

      HashiCorp Vault Transit integration requires Spring Vault:

      <dependency>
          <groupId>org.springframework.vault</groupId>
          <artifactId>spring-vault-core</artifactId>
          <version>2.3.2</version>
      </dependency>

      Configuration

      To enable Field-Level Encryption, supply a CryptoManager when configuring the Java SDK’s ClusterEnvironment.

      KeyStore javaKeyStore = KeyStore.getInstance("MyKeyStoreType");
      FileInputStream fis = new java.io.FileInputStream("keyStoreName");
      char[] password = { 'a', 'b', 'c' };
      javaKeyStore.load(fis, password);
      Keyring keyring = new KeyStoreKeyring(javaKeyStore, keyName -> "swordfish");
      
      // AES-256 authenticated with HMAC SHA-512. Requires a 64-byte key.
      AeadAes256CbcHmacSha512Provider provider = AeadAes256CbcHmacSha512Provider.builder().keyring(keyring).build();
      
      CryptoManager cryptoManager = DefaultCryptoManager.builder().decrypter(provider.decrypter())
          .defaultEncrypter(provider.encrypterForKey("myKey")).build();
      
      Cluster cluster = Cluster.connect("localhost",
          ClusterOptions.clusterOptions("username", "password")
              .environment(env -> env.cryptoManager(cryptoManager)));

      Usage

      Two modes of operation are available:

      • Transparent encryption/decryption during Jackson data binding.

      • Manual field editing using JsonObjectCrypto.

      Data Binding Example

      Sensitive fields of your data classes can be annotated with @Encrypted. Let’s use this class as an example:

      public class Employee {
        @Encrypted
        private boolean replicant;
      
        // alternatively you could annotate the getter or setter
        public boolean isReplicant() {
          return replicant;
        }
      
        public void setReplicant(boolean replicant) {
          this.replicant = replicant;
        }
      }

      Now let’s create an employee record and save it to Couchbase:

      Employee employee = new Employee();
      employee.setReplicant(true);
      collection.upsert("employee:1234", employee); // encrypts the "replicant" field

      You can get the document as a JsonObject to verify the field was encrypted:

      JsonObject encrypted = collection.get("employee:1234").contentAsObject(); // does not decrypt anything
      
      System.out.println(encrypted);

      Because contentAsObject() does not decrypt anything, the expected output is something like:

      {
        "encrypted$replicant": {
          "alg": "AEAD_AES_256_CBC_HMAC_SHA512",
          "ciphertext": "xwcxyUyZ.....",
          "kid": "myKey"
        }
      }

      Now let’s read the employee record using data binding:

      Employee readItBack = collection.get("employee:1234").contentAs(Employee.class); // decrypts the "replicant" field
      
      System.out.println(readItBack.isReplicant());

      This prints true.

      Using a custom ObjectMapper

      The code that enables encryption/decryption during data binding is packaged as a Jackson module called EncryptionModule. You can register this module with any Jackson ObjectMapper.

      You’ll need to do this if you want to supply your own customized ObjectMapper for the Java SDK to use when serializing documents. Here’s how to configure the cluster environment to use a custom JSON serializer backed by your own ObjectMapper with support for Field-Level Encryption:

      // CryptoManager cryptoManager = createMyCryptoManager();
      KeyStore javaKeyStore = KeyStore.getInstance("MyKeyStoreType");
      FileInputStream fis = new java.io.FileInputStream("keyStoreName");
      char[] ksPassword = { 'a', 'b', 'c' };
      javaKeyStore.load(fis, ksPassword);
      Keyring keyring = new KeyStoreKeyring(javaKeyStore, keyName -> "swordfish");
      
      // AES-256 authenticated with HMAC SHA-512. Requires a 64-byte key.
      AeadAes256CbcHmacSha512Provider provider = AeadAes256CbcHmacSha512Provider.builder().keyring(keyring).build();
      CryptoManager cryptoManager = DefaultCryptoManager.builder().decrypter(provider.decrypter())
          .defaultEncrypter(provider.encrypterForKey("myKey")).build();
      
      ObjectMapper mapper = new ObjectMapper();
      mapper.registerModule(new JsonValueModule()); // for JsonObject
      mapper.registerModule(new EncryptionModule(cryptoManager));
      
      // Here you can register more modules, add mixins, enable features, etc.
      
      Cluster cluster = Cluster.connect(connectionString,
          ClusterOptions.clusterOptions(username, password)
              .environment(env -> env
                  .cryptoManager(cryptoManager)
                  .jsonSerializer(JacksonJsonSerializer.create(mapper))
              ));

      JsonObjectCrypto

      If you need more control of which fields get decrypted, or if you prefer working with the Couchbase JsonObject tree model, you can use a JsonObjectCrypto instance to read and write encrypted field values of a JsonObject.

      JsonObject document = JsonObject.create();
      JsonObjectCrypto crypto = document.crypto(collection);
      
      crypto.put("locationOfBuriedTreasure", "Between palm trees");
      
      // This displays the encrypted form of the field
      System.out.println(document);
      
      collection.upsert("treasureMap", document);
      
      JsonObject readItBack = collection.get("treasureMap").contentAsObject();
      JsonObjectCrypto readItBackCrypto = crypto.withObject(readItBack);
      System.out.println(readItBackCrypto.getString("locationOfBuriedTreasure"));

      Reading Unencrypted Fields

      From Java SDK 3.2.1, the @Encrypted annotation can now be used to migrate an existing field from unencrypted to encrypted. If you annotate a field with:

      @Encrypted(migration = Encrypted.Migration.FROM_UNENCRYPTED)

      then either encrypted or unencrypted values will be accepted during deserialization (without the latter causing error). See the API docs.

      Encryption means that document fields have been authenticated. Enabling this feature bypasses that protection, and so this should only be used in strictly limited circumstances, such as the migration from an unencrypted to an encrypted field.

      Creating Encryption Keys

      The AEAD_AES_256_CBC_HMAC_SHA512 algorithm included in this library uses encryption keys that are 64 bytes long.

      Here’s an example that shows how to create a Java key store file containing a suitable encryption key:

      KeyStore keyStore = KeyStore.getInstance("JCEKS");
      keyStore.load(null); // initialize new empty key store
      
      // Generate 64 random bytes
      SecureRandom random = new SecureRandom();
      byte[] keyBytes = new byte[64];
      random.nextBytes(keyBytes);
      
      // Add a new key called "my-key" to the key store
      KeyStoreKeyring.setSecretKey(keyStore, "my-key", keyBytes, "protection-password".toCharArray());
      
      // Write the key store to disk
      try (OutputStream os = new FileOutputStream("MyKeystoreFile.jceks")) {
        keyStore.store(os, "integrity-password".toCharArray());
      }

      And here’s how to use that file to create a Keyring for use with Couchbase Field-Level Encryption:

      KeyStore keyStore = KeyStore.getInstance("JCEKS");
      try (InputStream is = new FileInputStream("MyKeystoreFile.jceks")) {
        keyStore.load(is, "integrity-password".toCharArray());
      }
      
      KeyStoreKeyring keyring = new KeyStoreKeyring(keyStore, keyName -> "protection-password");

      Migrating from SDK 2

      SDK 2.x reached end-of-life long ago, but should you have fields encrypted by SDK 2.x, and the need to read them from SDK 3.x, then follow the steps in the archived documents.

      The encryption algorithms used by SDK 2 are deprecated, and are no longer used for encrypting new data. Do not rely on the security of outdated encryption algorithms.