Managing a single PostgreSQL instance can be challenging when failures happen. Replicas can be added and promoted when needed. However, application traffic has to be redirected to the new primary. At OVHcloud, a major cloud computing provider in Europe, we use load balancers in front of our databases clusters on production. In that case, PostgreSQL sees then all client connections coming from those IP addresses. That means we couldn't...
SELinux (Security Enhanced Linux) provides an enhanced security mechanism for more advanced access control and auditing. It allows your application software and your system users to only access the resources it's been preconfigured to allow. Of course, when you want to move your data- or log files to a non-standard location these policies will stop your database from starting.
The easy way out is obviously to set SELinux to...
In this talk Travis Frutas and Brian Walters will discuss the process and technical details of PCI compliance, and how these are implemented with PerconaServer for MongoDB.
Regulatory compliance is high on the list of concerns for companies across multiple industry vertices, for many good reasons. We’ll discuss what compliance means, where responsibilities lie for providing a compliant environment and then provide a practical...
- Importance of securing database and access restriction
- Benefits of centralized access control...
MongoDBSecurityPercona Open Source Software
Join Stephen Thorn and Michał Nosek, Percona Technical Experts, as they discuss MongoDB Encryption at Rest.
This hands-on workshop will walk through the process of setting up data-at-rest encryption in Percona Server for MongoDB (PSMDB). Data-at-rest encryption is one of the methods used to secure database deployments from unauthorized data access. It’s also commonly required for enterprise-grade database deployments due to...
Data breaches seem to be a daily occurrence, so much so that seeing an article about the latest company to fall victim draws little attention outside of those immediately impacted. That is of course unless that company is yours and data security is your responsibility! While companies continue to invest heavily in fortifying networks with firewalls and event monitors, spend heavily on user education, and add layer after layer of...
SecurityPercona Monitoring and Management
In this webinar you'll first learn which threat each of the subsystems address.
Secondly which parts probably differ by convention to other databases you know.
Lastly some practical "where" and "how" on enabling them, as well as...
1- A brief overview of MySQL at LinkedIn
2- MySQL Access Management- Privileged User Access Control- Fine-grained Access Control- Access to application owners
3- SSL- Applications to Databases- Replication
4- Audit Framework- Audit Plugin- Syslog to Kafka- Query Analyzer
5- How applications get...
Percona Live SessionsMySQLSecurity
Please watch Percona’s Senior Support Engineer Adamo Tonete as he presents “MongoDB Data Security - Custom Rules and Views”
In this presentation, we will discuss how to create custom rules when the default rules are not enough for the application.
Have you ever needed to give a more permissive rule to a user just because this user wanted to run a specific command?
Also, we will discuss how to use view for hiding...
MongoDBPercona MySQL WebinarsSecurity
Tate McDaniel (Percona), Charles Thompson (Empowered Benefits) deliver the talk, "At Rest Encryption with MySQL and Vault", on DAY 2 of the Percona Live Open Source Database Conference 2019, 5/30, at Austin, TX.
A discussion of different types of encryption as it relates to MySQL and the community, followed by a deep dive into key management with Hashicorp's Vault software and MySQL.
Real world examples, problems, and "...
Percona Live SessionsMySQLSecurity