Security

MySQL Encryption: How Master Key Rotation Works

MySQL How Master Key Rotation Works

In the last blog post of this series, we discussed in detail how Master Key encryption works. In this post, based on what we already know about Master Key encryption, we look into how Master Key rotation works.
The idea behind Master Key rotation is that we want to generate a new Master Key and […]

Read more

MongoDB: Why Pay for Enterprise When Open Source Has You Covered?

alternatives to paying a MongoDB

When Percona first published the blog MongoDB Security: Why Pay for Enterprise when Open Source Has You Covered? , I constantly referenced it. Comparing MongoDB Enterprise to Percona Server for MongoDB has become such a common topic for discussion with Percona’s current and future customers that the information contained in that blog is ingrained in my […]

Read more

How Securing MySQL with TCP Wrappers Can Cause an Outage

securing mysql tcp

The Case
Securing MySQL is always a challenge. There are general best practices that can be followed for securing your installation, but the more complex setup you have the more likely you are to face some issues which can be difficult to troubleshoot.
We’ve recently been working on a case (thanks Alok Pathak and Janos Ruszo […]

Read more

Data Masking in Percona Server for MySQL to Protect Sensitive Data

Data Masking in Percona Server for MySQL

Starting with Percona Server for MySQL 8.0.17, Percona Server ships with a data masking plugin, using the same API as the MySQL Enterprise Masking and De-identification feature. This plugin was developed by MySQL Enterprise plugin.
What is Data Masking?
The data masking plugin mentioned above provides easy-to-use methods to hide sensitive data, such as social security […]

Read more

MySQL Encryption: Master Key Encryption in InnoDB

master key encryption innodb

In the previous blog post of this series, MySQL Encryption: Talking About Keyrings, I described how keyrings work. In this post, I will talk about how master key encryption works and what the pros and cons are of using envelope encryption such as a master key.
The idea behind envelope encryption is that you use […]

Read more