Importing or Changing Your SSL Certificate in ClusterControl
SSL encryption is clearly one of the must-haves for database deployments. It is required by all security standards and even if your organization does not have to comply with PCI DSS, HIPPA or other similar...
How to Secure MySQL: Part Two
In the previous post about MySQL security, we have covered a range of options that can be used to make your MySQL instance(s) more secure. They included: General MySQL security measures; Controlling access in MySQL;...
How to Secure MySQL: Part One
Whenever application security is mentioned, people think of securing applications against some of the most frequent attacks such as injection, broken authentication, sensitive data exposure, and the like. However, while these attacks are prevalent, knowing...
ClusterControl’s Vault Integration Adds Dynamic Data Security Protections
The security is paramount nowadays, especially for the organizations that deal with the sensitive data - financial, health, personal data. In those cases you are obliged to comply with numerous security and data protection standards...
Using the MariaDB Audit Plugin for Database Security
There are different ways to keep your data safe. Practices such as controlling database access, securing configuration, upgrading your system, and more are part of database security. It is even possible that you have security...
Using SSH Tunneling as a VPN Alternative
Using a VPN connection is the most secure way to access a network if you are working remotely, but as this configuration could require hardware, time, and knowledge, you should probably want to know alternatives...
My DBA is Sick – Database Security Tips for SysAdmins
The day happened when your database administrator did not show up on the daily online standup. Shortly after you have learned that he’ll be unavailable for an unknown period of time and it is you,...
How to Protect Your MySQL & MariaDB Database Against Cyberattacks When on a Public Network
It is sometimes inevitable to run MySQL database servers on a public or exposed network. This is a common setup in a shared hosting environment, where a server is configured with multiple services and often...
How to Protect your MySQL or MariaDB Database From SQL Injection: Part One
Security is one of the most important elements of the properly designed database environment. There are numerous attack vectors used with SQL injection being probably the most popular one. You can design layers of defence...
Is My Database Vulnerable to Attack? A Security Checklist
Data is probably the most important asset in a company, so you should make sure your database is secured to avoid any possible data theft. It’s hard to create an environment that is 100% secure,...
A SOx Compliance Checklist for PostgreSQL
The United States SOx (Sarbanes-Oxley) Act, 2002, addresses a broad spectrum of fundamental information security principles for commercial enterprises, ensuring their functions are rooted and consistently applied, based on concepts of CIA (Confidentiality, Integrity, and...
Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part Two
In the first part of this series, we have covered in-transit encryption configuration for MariaDB replication servers, where we configured client-server and replication encryptions. Taken from the first post, where we had partially configured our...