Skip to main content

What inbound and outbound IP addresses are required for Encryption at Rest using CMK with a cloud provider's KMS?

Venkat Cherukuri avatar
Written by Venkat Cherukuri
Updated this week

Answer

Atlas encrypts all cluster storage and snapshot volumes at rest by default. You can add another layer of security by using your cloud provider's KMS together with the MongoDB encrypted storage engine.

The Return All Control Plane IP Addresses API endpoint returns a list inbound and outbound Atlas control plane IP addresses in CIDR notation, categorized by cloud provider and region. A snippet is provided for example:

{ "inbound": { "aws": { "ap-northeast-1": [ "52.192.130.90/32", "52.193.61.21/32" ], ... "outbound": { "aws": { "ap-northeast-1": [ "35.76.187.172/32", "57.180.230.183/32", "13.112.169.243/32", "52.197.152.79/32", "54.199.195.221/32" ], ... ], "us-east-1": [ "3.212.79.116/32", "3.92.113.229/32", "34.193.91.42/32", "34.237.40.31/32", "3.215.10.168/32", "34.236.228.98/32", "3.214.203.147/32", "3.208.110.31/32", "100.26.2.217/32", "3.215.143.88/32", "52.0.74.246/32", "3.223.8.180/32" ],

The inbound access is traffic coming into the Atlas control plane from your network and outbound access is traffic coming from the Atlas control plane into your network.

For the Encryption at Rest using Customer Key Management feature, you must provide network access from the Atlas control plane IP addresses to your network. Specifically, ensure that your cloud provider's KMS allows access from all outbound addresses provided by the Return All Control Plane IP Addresses API endpoint.

To use the Encryption at Rest with Customer Key Management feature, it is necessary to allow access to all Control Plane IP addresses listed in the outbound section (see the Allow Access From the Atlas Control Plane documentation for more details), not just those corresponding to your cloud provider's KMS. For example, if you are using Azure Key Vault, you must allow access to all IP addresses, including those from AWS and GCP, in the outbound section of your network, and not restrict it solely to Azure-specific IP addresses. Atlas has services that are deployed across all the cloud providers and their communication with the customer endpoints is necessary.

Alternatively, for Azure Key Vault, the "Encryption at Rest using Azure Key Vault over Private Endpoints" feature is available upon request. To enable this functionality for your Atlas deployments, contact your Account Manager.

Depending on your Key Management configuration, you may need to add the IP addresses of Atlas cluster nodes to your cloud provider’s KMS access list to ensure proper communication between the cluster and your KMS.

Additional information

Did this answer your question?