Securing your MySQL/MariaDB data
This presentation will discuss the features of MySQL/MariaDB that when enabled and used improve the default usage of MySQL. Many cloud-based applications fail to - Using appropriate filesystem permissions - Using TLS/SSL for connections - Using TLS/SSL with MySQL replication - Using external authentication plugins (LDAP, PAM, Kerberos) - Encrypting all your data at rest - Monitoring your database with the audit plugin - Reviewing and rejecting SQL injections - Designing application access using traditional firewall technology - Other MySQL/MariaDB security features We will end the presentation with some simple steps to hack a MySQL installation.
MySQL Database Consultant, Pythian
Ronald has over 25 years of professional RDBMS experience in MySQL, Oracle, and Ingres. His expertise covers MySQL, LAMP and cloud-based consulting in architecture, performance, scalability and business continuity. Ronald is a former employee of the MySQL Inc consulting team (06-08) and Oracle Corporation (96-99). He has currently published 4 books on MySQL, his most recent titles available from Oracle Press include Effective MySQL: Optimizing SQL Statements, Effective MySQL: Backup & Recovery and Effective MySQL: Replication Techniques in Depth.
Chief Evangelist, Percona
Colin Charles is the Chief Evangelist at Percona. He was previously on the founding team of MariaDB Server in 2009, and had worked at MySQL since 2005, and been a MySQL user since 2000. Before joining MySQL, he worked actively on the Fedora and OpenOffice.org projects. He's well known within open source communities in APAC, and has spoken at many conferences.