Automating PostgreSQL Backups: A Guide
If you are a database administrator, chances are that you have backups of your data. And if you have backups of your data, chances are that you thought about how to automate your backup processes...
How to Get Started With Database Automation
Database automation helps make complex and time consuming tasks simple and fast. The tasks most commonly and easily identified for automation are those that are time-consuming yet repetitive. These often consume productivity, and can affect...
Automating Security Audits for PostgreSQL
Security audits are a must in all companies to protect data and avoid any possible security breaches, but it is also a time-consuming task as you need to check a lot of things periodically. The...
Enforcing Role-Based Access Controls with ClusterControl
In Severalnines’ recent release of ClusterControl version 1.8.2 we have introduced a lot of sophisticated features and changes. One of the important features is the newly improved User Management System, which covers New User and...
Audit Logging for PostgreSQL
Auditing is a requirement for many security regulations or standards, like PCI - Payment Card Industry, and even a good way to keep your data as safe as possible knowing what is happening in your...
How to Close the Vulnerability Gap in PostgreSQL
No matter what kind of technology or security system you have in place, there is always a risk of being hacked as there is no 100% secured system. As data is probably the most important...
Tips and Tricks for Implementing Database Role-Based Access Controls for MariaDB
In a database management system (DBMS), role-based access controls (RBAC), is a restriction on database resources based on a set of pre-defined groups of privileges and has become one of the main methods for advanced...
Database Encryption: Why and Where You Need to Have Data Encryption
Database encryption provides enhanced security for your at-rest and in-transit data. Many organizations have started to look at data encryption seriously with recent security breach cases. In most cases, database servers are a common target...
The DevOps Open-Source Database Audit Manual – Everything You Should Know
Auditing is the monitoring and recording of selected user database actions. It is typically used to investigate suspicious activity or monitor and gather data about specific database activities. For example, the database administrator can gather...
Database Security 101: Understanding Database Access Privileges
Data is the new gold for big companies and organizations It's considered as the lifeblood of most modern businesses and there's a bonanza of opportunities to sell or to market to the large audience of...
Standardizing PostgreSQL Security Across Multi-Cloud Environments
Multi-Cloud Environment is a common topology and even recommended for a Disaster Recovery Plan (DRP), but the security could be a risk here as you need to add to the common security checks an extra...
Driving Performance in a Hybrid Cloud Setup
A hybrid cloud refers to mixed computing, storage, and services environment made up of on-premises infrastructure, private cloud services, and a public cloud orchestration among the various platforms. Using a combination of public clouds, on-premises...