MySQL Security with ClusterControl
If you are an experienced MySQL DBA, you probably already know how important MySQL security is. For you, security comes without any question - you already secured your database instances from the get-go: as soon...
How to configure SELinux for MySQL-based systems (MySQL/MariaDB Replication + Galera)
In the era that we are living in now, anything with a less secure environment is easily a target for an attack and becomes a bounty for the attackers. Compared to the past 20 years,...
How to Configure AppArmor for MongoDB Replica Sets?
There are many sections and layers of security if we are talking about the hardening of databases. It starts from the encryption of the underlying storage disk, database access privileges, authentication, network access control, data...
6 Critical Components of Successful Data Governance
Properly established data governance means that you can make faster and smarter decisions. It sounds simple, but it requires you to build a set of processes and a culture that respects certain key principles. If...
Automating Security Audits for MySQL
Taking care of the security of your MySQL instances is a near-daily task of almost every MySQL DBA. Today, we will look into how you should go about automating security audits for MySQL. Why Automate...
How to use Encryption to Protect MongoDB data
With many kinds of data stored in the database, sometimes we may be dealing with confidential data, which might include credit card data, financial record, personal information. Those PII (Personal Identifiable Information) data is subject...
Automating Security Audits for PostgreSQL
Security audits are a must in all companies to protect data and avoid any possible security breaches, but it is also a time-consuming task as you need to check a lot of things periodically. The...
Tips and Trick using Audit Logging for MariaDB
MariaDB’s Audit Plugin provides auditing functionality for not only MariaDB but MySQL as well (as of, version 5.5.34 and 10.0.7) and Percona Server. MariaDB started including by default the Audit Plugin from versions 10.0.10 and...
Securing MySQL – Making Use of Data Access Privileges for a Secure Installation
MySQL installation security is something that should be on the mind of every MySQL DBA. While we have discussed how you should take care of your MySQL security as a whole (take a look at...
Leveraging Zero Trust Technologies
What is Zero Trust? Today's cloud environments are generally predicated on the use of public, or rather, untrusted networks. In such untrusted networks, the application of security models that have been used in traditional perimeter...
Architecting for Security : A Guide for MongoDB
The prevalence of data breaches is no longer surprising. Based on the just released FBI cybercrime report, victims of cybercrime have cumulatively lost a whopping $4.2 billion in 2020 which is $700 million more than...
How to Close the Vulnerability Gap in PostgreSQL
No matter what kind of technology or security system you have in place, there is always a risk of being hacked as there is no 100% secured system. As data is probably the most important...