How to Easy Manage Database Updates and Security Patches
Database security requires careful planning, but it is important to remember that security is not a state, it is a process. Once the database is in place, monitoring, alerting and reporting on changes are an...
How to Protect Your MySQL & MariaDB Database Against Cyberattacks When on a Public Network
It is sometimes inevitable to run MySQL database servers on a public or exposed network. This is a common setup in a shared hosting environment, where a server is configured with multiple services and often...
How to Protect your MySQL or MariaDB Database From SQL Injection: Part Two
In the first part of this blog we described how ProxySQL can be used to block incoming queries that were deemed dangerous. As you saw in that blog, achieving this is very easy. This is...
How to Protect your MySQL or MariaDB Database From SQL Injection: Part One
Security is one of the most important elements of the properly designed database environment. There are numerous attack vectors used with SQL injection being probably the most popular one. You can design layers of defence...
Is My Database Vulnerable to Attack? A Security Checklist
Data is probably the most important asset in a company, so you should make sure your database is secured to avoid any possible data theft. It’s hard to create an environment that is 100% secure,...
A SOx Compliance Checklist for PostgreSQL
The United States SOx (Sarbanes-Oxley) Act, 2002, addresses a broad spectrum of fundamental information security principles for commercial enterprises, ensuring their functions are rooted and consistently applied, based on concepts of CIA (Confidentiality, Integrity, and...
Using OpenVPN to Secure Access to Your Database Cluster in the Cloud
The internet is a dangerous place, especially if you’re leaving your data unencrypted or without proper security. There are several ways to secure your data; all at different levels. You should always have a strong...
Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part Two
In the first part of this series, we have covered in-transit encryption configuration for MariaDB replication servers, where we configured client-server and replication encryptions. Taken from the first post, where we had partially configured our...
Full MariaDB Encryption At-Rest and In-Transit for Maximum Data Protection – Part One
In this blog series, we are going to give you a complete walkthrough on how to configure a fully encrypted MariaDB server for at-rest and in-transit encryption, to ensure maximum protection of the data from...
Securing MongoDB from External Injection Attacks
MongoDB security is not fully-guaranteed by simply configuring authentication certificates or encrypting the data. Some attackers will “go the extra mile” by playing with the received parameters in HTTP requests which are used as part...
How to Use the Roles That Have Changed in MySQL 8.0
Database Security is important to any MySQL setup. Users are the foundation of any system. In terms of database systems, I generally think of them in two distinct groups: Application, service, or program users - basically...
How to Use Encryption to Protect Your MongoDB Data
Database security is a key factor to consider for any application that involves highly sensitive data such as financial and health reports. Data protection can be achieved through encryption at different levels starting from the...