[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-05 UTC。"],[[["\u003cp\u003eFirestore in Datastore mode automatically encrypts all data before writing it to disk, without requiring any setup or configuration.\u003c/p\u003e\n"],["\u003cp\u003eServer-side encryption allows for either Google-managed cryptographic keys or customer-managed encryption keys (CMEK), providing flexibility in key management.\u003c/p\u003e\n"],["\u003cp\u003eClient-side encryption can be used in combination with server-side encryption, resulting in double encryption, but it necessitates secure management of user's own encryption keys.\u003c/p\u003e\n"],["\u003cp\u003eData in transit is protected using Transport Layer Security (TLS) during read and write operations.\u003c/p\u003e\n"],["\u003cp\u003eEach Datastore object's data and metadata are encrypted, and each encryption key is further encrypted with a regularly rotated set of keystore master keys.\u003c/p\u003e\n"]]],[],null,["# Server-Side Encryption\n\nFirestore in Datastore mode automatically encrypts all data before it is written to disk.\nThere is no setup or configuration required and no need to modify the way you\naccess the service. The data is automatically and transparently decrypted when\nread by an authorized user.\n\nKey management\n--------------\n\nWith server-side encryption, you can either let Google manage cryptographic keys on your\nbehalf or use customer-managed encryption keys (CMEK) to manage the keys\nyourself.\n\nBy default, Google manages cryptographic keys on your behalf using the same\nhardened key management systems that we use for our own encrypted data,\nincluding strict key access controls and auditing. Each Datastore mode\nobject's data and metadata is [encrypted](/security/encryption/default-encryption) and each encryption key is itself\nencrypted with a regularly rotated set of keystore master keys.\n\nFor information about managing the keys yourself, see\n[CMEK for Datastore](/datastore/docs/cmek).\n\nClient-side encryption\n----------------------\n\nServer-side encryption can be used in combination with client-side encryption.\nIn client-side encryption, you manage your own encryption keys and encrypt data\nbefore writing it to your database. In this case, your data is\nencrypted twice, once with your keys and once with the server-side keys.\n| **Warning:** Firestore in Datastore mode does not know if your data has already been encrypted client-side, nor does Datastore mode have any knowledge of your client-side encryption keys. If you use client-side encryption, you must securely manage your encryption keys.\n\nTo protect your data as it travels over the Internet during read and write\noperations, we use Transport Layer Security (TLS). For more information about\nthe supported TLS versions, see [Encryption in transit in Google Cloud](/docs/security/encryption-in-transit#user_to_google_front_end_encryption).\n\nWhat's next\n-----------\n\nFor more information about encryption at rest for Firestore in Datastore mode and\nother Google Cloud products, see\n[Encryption at Rest in Google Cloud](/security/encryption/default-encryption)."]]