SlideShare a Scribd company logo
WEBINAR:
Enterprise-class security with PostgreSQL
Ajit G.
Principal Solution Architect, Ashnik
Jayaraj S.
Solution Architect, EnterpriseDB
Nishchay K.
Database Consultant, Ashnik
Webinar Covers
• Understanding the criticality of the security aspect in database design and why
Postgres is today’s default choice.
• What security features does Postgres offer to help organizations achieve the
Enterprise level security for their databases?
• Demo: Data redaction and EDB* Wrap (How it secure the business data and logic
inside the database)
“The average cost of a security breach has increased to $2.71 million per organization across ASEAN,
with the time taken to identify and contain an attack rising to 287 days.”
-- Channel News Asia, 20th Aug 2020
Business Impact
• Financial Lost/ Revenue Lost.
• Brand Value / Reputation.
• Stock Prices.
• Consumer Trust.
• Customers Turn Over
Standards and Techniques
• ISO, PCI DSS, GDPR, PII (Personal
Identifiable Information, HIPAA, PHI)
• AI and Machine Learning based
technique using XDR
• Multi Cloud adoptions
• Zero Trust Authentication /Network
• Focus on IT Security
RDBMS Security Techniques
“AAA” Model
• Authentication
• Authorization
• Accounting
 Backup & Recovery
 Encryption
 Data Masking
 Tokenization
 Deleting and Ensure
7
Enterprise-class security
with PostgreSQL
I will be covering
• Security Model
• Security Features in PostgreSQL
• Security Features in EPAS
• Best Practices
• Demo
Security Model
• Secure access is a two step process:
 Authentication:
Ensures a user he/she claims to be
 Authorization:
Ensures an authenticated user has access to only the data for which he/she has
been granted the appropriate privileges
Authentication Methods
• Password: Store password in scram-sha-256 & md5
• Certificate: It use SSL client certificates to perform authentication.
• RADIUS: Use RADIUS server for authentication
• LDAP: It use LDAP as the password verification method
Level of Security in PostgreSQL
Security Features in PostgreSQL
• Row Level Security – Virtual Private Database
• SSL support
• Encryption
 Password Encryption
 Encryption For Specific Columns
 Data Partition Encryption
 Encrypting Data Across A Network
• Data Masking
• Audit
 pgAudit – Extension
Security Features in EPAS
• All Security features of PostgreSQL
• Password Policy
• Code Protection
• SQL Protect
• Encryption
 DBMS_CRYPTO
• Data Masking
 Data Redaction
• Audit
 EDB Audit
Password Profile
• Advanced Server allows a database superuser to create named profiles. Each profile
defines rules for password management that augment password and md5
authentication. The rules in a profile can:
 Count failed login attempts
 Lock an account due to excessive failed login attempts
 Mark a password for expiration
 Define a grace period after a password expiration
 Define rules for password complexity
 Define rules that limit password re-use
Code Protection
• The EDB*Wrap utility protects proprietary source code and programs (functions, stored
procedures, triggers, and packages) from unauthorized scrutiny.
• The EDB*Wrap program translates a file that contains SPL or PL/pgSQL source code (the
plaintext) into a file that contains the same code in a form that is nearly impossible to
read.
• Once you have the obfuscated form of the code, you can send that code to EPAS and it
will store those programs in obfuscated form.
• edbwrap does not validate SQL source code - if the plaintext form contains a syntax
error, edbwrap will not complain but EPAS will report an error and abort the entire file
when you try to execute the obfuscated form.
SQL Protect
• Guards against the various types of SQL injections.
 Unauthorized Relations
 Utility Commands
 SQL Tautology
 Unbounded DML Statements
Encryption
• DBMS_CRYPTO package provides functions and procedures that allow you to encrypt or
decrypt RAW, BLOB or CLOB data.
• DBMS_CRYPTO functions to generate cryptographically strong random values.
• ENCRYPT function or procedure uses a user-specified algorithm, key, and optional
initialization vector to encrypt RAW, BLOB or CLOB data.
• DECRYPT function or procedure decrypts data using a user-specified cipher algorithm,
key and optional initialization vector.
• HASH function uses a user-specified algorithm to return the hash value of
a RAW or CLOB value.
Data Masking
• Data Redaction limits sensitive data exposure by dynamically changing data as it is
displayed for certain users.
• Data redaction is implemented by defining a function for each field to which redaction is
to be applied. The function returns the value that should be displayed to the users
subject to the data redaction.
• For example, bank account numbers as XXXXXX1235
• Supports DBMS_REDACT package
Auditing
• Advanced Server allows database and security administrators, auditors, and operators
to track and analyze database activities using the EDB Audit Logging functionality.
• EDB Audit Logging generates audit log files, which contains all of the relevant
information.
 The audit logs can be configured to record information such as:
 When a role establishes a connection to an Advanced Server database
 What database objects a role creates, modifies, or deletes when connected to Advanced
Server
 When any failed authentication attempts occur
• Audit parameters specified in the configuration
files, postgresql.conf or postgresql.auto.conf, control the information included in the
audit logs.
• EDB Audit files/logs can be generate in CSV or XML format
Best Practices
• Avoid to use default values
 Change default port
 Use non-default name for superuser. Can be specified during initdb
 By default, each new database has connect privileges to public schema
o Revoke connect on my_db from public;
o Grant connect to my_db to my_app_user;
• Control who can connect from where
• Configure pg_hba.conf effectively
• Avoid to use 0.0.0.0/0
• Avoid “trust” authentication
• Allow DBAs to use their personal user_id (Ex. DBA Nishchay need to use user
“nishchay”)
• Application user should not have superuser privileges
Best Practices
• Password policy should be implemented
• Use connection timeout, logging of connection & disconnection with duration
• Use Grant & Revoke appropriately to control the access
• Sensitive data should be masked
• Apply patch on Time
THANK YOU FOR ATTENDING THE WEBINAR
Ad

Recommended

Enterprise-class security with PostgreSQL - 2
Enterprise-class security with PostgreSQL - 2
Ashnikbiz
 
Expanding with EDB Postgres Advanced Server 9.5
Expanding with EDB Postgres Advanced Server 9.5
EDB
 
EDB Postgres Platform
EDB Postgres Platform
EDB
 
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
IDERA Software
 
Azure database services for PostgreSQL and MySQL
Azure database services for PostgreSQL and MySQL
Amit Banerjee
 
Achieving HIPAA Compliance with Postgres Plus Cloud Database
Achieving HIPAA Compliance with Postgres Plus Cloud Database
EDB
 
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
IDERA Software
 
Deploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platforms
Ashnikbiz
 
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Antonios Chatzipavlis
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERA
IDERA Software
 
Azure SQL Database
Azure SQL Database
rockplace
 
Data Platform Overview
Data Platform Overview
Hamid J. Fard
 
Cloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJ
EDB
 
5 Postgres DBA Tips
5 Postgres DBA Tips
EDB
 
Azure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - Introduction
giventocode
 
5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready
EDB
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
SQL Server 2019 Data Virtualization
SQL Server 2019 Data Virtualization
Matthew W. Bowers
 
Azure - Data Platform
Azure - Data Platform
giventocode
 
Webinar: Managing Postgres at Scale
Webinar: Managing Postgres at Scale
EDB
 
Azure data platform overview
Azure data platform overview
Alessandro Melchiori
 
Transform Your DBMS to Drive Application Innovation
Transform Your DBMS to Drive Application Innovation
EDB
 
SQL Database on Azure
SQL Database on Azure
Thurupathan Vijayakumar
 
Introduction to Windows Azure Data Services
Introduction to Windows Azure Data Services
Robert Greiner
 
Microsoft Azure Offerings and New Services
Microsoft Azure Offerings and New Services
Mohamed Tawfik
 
SQL Server 2019 Big Data Cluster
SQL Server 2019 Big Data Cluster
Maximiliano Accotto
 
Keynote: The Postgres Ecosystem
Keynote: The Postgres Ecosystem
EDB
 
DBaaS with EDB Postgres on AWS
DBaaS with EDB Postgres on AWS
EDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 

More Related Content

What's hot (20)

Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Antonios Chatzipavlis
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERA
IDERA Software
 
Azure SQL Database
Azure SQL Database
rockplace
 
Data Platform Overview
Data Platform Overview
Hamid J. Fard
 
Cloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJ
EDB
 
5 Postgres DBA Tips
5 Postgres DBA Tips
EDB
 
Azure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - Introduction
giventocode
 
5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready
EDB
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
SQL Server 2019 Data Virtualization
SQL Server 2019 Data Virtualization
Matthew W. Bowers
 
Azure - Data Platform
Azure - Data Platform
giventocode
 
Webinar: Managing Postgres at Scale
Webinar: Managing Postgres at Scale
EDB
 
Azure data platform overview
Azure data platform overview
Alessandro Melchiori
 
Transform Your DBMS to Drive Application Innovation
Transform Your DBMS to Drive Application Innovation
EDB
 
SQL Database on Azure
SQL Database on Azure
Thurupathan Vijayakumar
 
Introduction to Windows Azure Data Services
Introduction to Windows Azure Data Services
Robert Greiner
 
Microsoft Azure Offerings and New Services
Microsoft Azure Offerings and New Services
Mohamed Tawfik
 
SQL Server 2019 Big Data Cluster
SQL Server 2019 Big Data Cluster
Maximiliano Accotto
 
Keynote: The Postgres Ecosystem
Keynote: The Postgres Ecosystem
EDB
 
DBaaS with EDB Postgres on AWS
DBaaS with EDB Postgres on AWS
EDB
 
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Antonios Chatzipavlis
 
Advanced SQL Server Performance Tuning | IDERA
Advanced SQL Server Performance Tuning | IDERA
IDERA Software
 
Azure SQL Database
Azure SQL Database
rockplace
 
Data Platform Overview
Data Platform Overview
Hamid J. Fard
 
Cloud Native PostgreSQL - APJ
Cloud Native PostgreSQL - APJ
EDB
 
5 Postgres DBA Tips
5 Postgres DBA Tips
EDB
 
Azure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - Introduction
giventocode
 
5 Ways to Make Your Postgres GDPR-Ready
5 Ways to Make Your Postgres GDPR-Ready
EDB
 
Geek Sync | SQL Security Principals and Permissions 101
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
SQL Server 2019 Data Virtualization
SQL Server 2019 Data Virtualization
Matthew W. Bowers
 
Azure - Data Platform
Azure - Data Platform
giventocode
 
Webinar: Managing Postgres at Scale
Webinar: Managing Postgres at Scale
EDB
 
Transform Your DBMS to Drive Application Innovation
Transform Your DBMS to Drive Application Innovation
EDB
 
Introduction to Windows Azure Data Services
Introduction to Windows Azure Data Services
Robert Greiner
 
Microsoft Azure Offerings and New Services
Microsoft Azure Offerings and New Services
Mohamed Tawfik
 
SQL Server 2019 Big Data Cluster
SQL Server 2019 Big Data Cluster
Maximiliano Accotto
 
Keynote: The Postgres Ecosystem
Keynote: The Postgres Ecosystem
EDB
 
DBaaS with EDB Postgres on AWS
DBaaS with EDB Postgres on AWS
EDB
 

Similar to Enterprise-class security with PostgreSQL - 1 (20)

Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
EDB
 
GDPR Webinar January 2018
GDPR Webinar January 2018
EDB
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
Satishbabu Gunukula
 
PGEncryption_Tutorial
PGEncryption_Tutorial
Vibhor Kumar
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security Features
Harin Vadodaria
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
Achieving Pci Compliace
Achieving Pci Compliace
Denish Patel
 
PostgreSQL Security. How Do We Think?
PostgreSQL Security. How Do We Think?
Ohyama Masanori
 
Securing PostgreSQL from External Attack
Securing PostgreSQL from External Attack
All Things Open
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
Georgi Kodinov
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
 
Improving oracle12c security
Improving oracle12c security
Laurent Leturgez
 
New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13
EDB
 
Secure pl-sql-coding
Secure pl-sql-coding
Trần Bình Hậu
 
Database security best_practices
Database security best_practices
Tarik Essawi
 
Improve oracle 12c security
Improve oracle 12c security
Laurent Leturgez
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
EDB
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
EDB
 
GDPR Webinar January 2018
GDPR Webinar January 2018
EDB
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
Satishbabu Gunukula
 
PGEncryption_Tutorial
PGEncryption_Tutorial
Vibhor Kumar
 
MySQL 8.0 - Security Features
MySQL 8.0 - Security Features
Harin Vadodaria
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
Achieving Pci Compliace
Achieving Pci Compliace
Denish Patel
 
PostgreSQL Security. How Do We Think?
PostgreSQL Security. How Do We Think?
Ohyama Masanori
 
Securing PostgreSQL from External Attack
Securing PostgreSQL from External Attack
All Things Open
 
DevTalks.ro 2019 What's New in MySQL 8.0 Security
DevTalks.ro 2019 What's New in MySQL 8.0 Security
Georgi Kodinov
 
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Percona Live Europe 2018: What's New in MySQL 8.0 Security
Georgi Kodinov
 
Improving oracle12c security
Improving oracle12c security
Laurent Leturgez
 
New enhancements for security and usability in EDB 13
New enhancements for security and usability in EDB 13
EDB
 
Database security best_practices
Database security best_practices
Tarik Essawi
 
Improve oracle 12c security
Improve oracle 12c security
Laurent Leturgez
 
Ad

More from Ashnikbiz (20)

CloudOps_tool.pptx
CloudOps_tool.pptx
Ashnikbiz
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptx
Ashnikbiz
 
Autoscaling in Kubernetes (K8s)
Autoscaling in Kubernetes (K8s)
Ashnikbiz
 
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Ashnikbiz
 
Zero trust in a multi tenant environment
Zero trust in a multi tenant environment
Ashnikbiz
 
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Ashnikbiz
 
Deploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platforms
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning-2
The Best Approach For Multi-cloud Infrastructure Provisioning-2
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning
The Best Approach For Multi-cloud Infrastructure Provisioning
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P2
Which PostgreSQL is right for your multi cloud strategy? P2
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P1
Which PostgreSQL is right for your multi cloud strategy? P1
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere 2
Reduce the complexities of managing Kubernetes clusters anywhere 2
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere
Reduce the complexities of managing Kubernetes clusters anywhere
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P2
Enhance your multi-cloud application performance using Redis Enterprise P2
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P1
Enhance your multi-cloud application performance using Redis Enterprise P1
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka P2
Build robust streaming data pipelines with MongoDB and Kafka P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka
Build robust streaming data pipelines with MongoDB and Kafka
Ashnikbiz
 
CloudOps_tool.pptx
CloudOps_tool.pptx
Ashnikbiz
 
Webinar_CloudOps final.pptx
Webinar_CloudOps final.pptx
Ashnikbiz
 
Autoscaling in Kubernetes (K8s)
Autoscaling in Kubernetes (K8s)
Ashnikbiz
 
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Ashnikbiz
 
Zero trust in a multi tenant environment
Zero trust in a multi tenant environment
Ashnikbiz
 
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Ashnikbiz
 
Deploy, move and manage Postgres across cloud platforms
Deploy, move and manage Postgres across cloud platforms
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning-2
The Best Approach For Multi-cloud Infrastructure Provisioning-2
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning
The Best Approach For Multi-cloud Infrastructure Provisioning
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P2
Which PostgreSQL is right for your multi cloud strategy? P2
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P1
Which PostgreSQL is right for your multi cloud strategy? P1
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere 2
Reduce the complexities of managing Kubernetes clusters anywhere 2
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere
Reduce the complexities of managing Kubernetes clusters anywhere
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P2
Enhance your multi-cloud application performance using Redis Enterprise P2
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P1
Enhance your multi-cloud application performance using Redis Enterprise P1
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka P2
Build robust streaming data pipelines with MongoDB and Kafka P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka
Build robust streaming data pipelines with MongoDB and Kafka
Ashnikbiz
 
Ad

Recently uploaded (20)

"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
 
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
"How to survive Black Friday: preparing e-commerce for a peak season", Yurii ...
Fwdays
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Enabling BIM / GIS integrations with Other Systems with FME
Enabling BIM / GIS integrations with Other Systems with FME
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Improving Data Integrity: Synchronization between EAM and ArcGIS Utility Netw...
Safe Software
 

Enterprise-class security with PostgreSQL - 1

  • 2. Ajit G. Principal Solution Architect, Ashnik Jayaraj S. Solution Architect, EnterpriseDB Nishchay K. Database Consultant, Ashnik
  • 3. Webinar Covers • Understanding the criticality of the security aspect in database design and why Postgres is today’s default choice. • What security features does Postgres offer to help organizations achieve the Enterprise level security for their databases? • Demo: Data redaction and EDB* Wrap (How it secure the business data and logic inside the database)
  • 4. “The average cost of a security breach has increased to $2.71 million per organization across ASEAN, with the time taken to identify and contain an attack rising to 287 days.” -- Channel News Asia, 20th Aug 2020 Business Impact • Financial Lost/ Revenue Lost. • Brand Value / Reputation. • Stock Prices. • Consumer Trust. • Customers Turn Over
  • 5. Standards and Techniques • ISO, PCI DSS, GDPR, PII (Personal Identifiable Information, HIPAA, PHI) • AI and Machine Learning based technique using XDR • Multi Cloud adoptions • Zero Trust Authentication /Network • Focus on IT Security
  • 6. RDBMS Security Techniques “AAA” Model • Authentication • Authorization • Accounting  Backup & Recovery  Encryption  Data Masking  Tokenization  Deleting and Ensure
  • 8. I will be covering • Security Model • Security Features in PostgreSQL • Security Features in EPAS • Best Practices • Demo
  • 9. Security Model • Secure access is a two step process:  Authentication: Ensures a user he/she claims to be  Authorization: Ensures an authenticated user has access to only the data for which he/she has been granted the appropriate privileges
  • 10. Authentication Methods • Password: Store password in scram-sha-256 & md5 • Certificate: It use SSL client certificates to perform authentication. • RADIUS: Use RADIUS server for authentication • LDAP: It use LDAP as the password verification method
  • 11. Level of Security in PostgreSQL
  • 12. Security Features in PostgreSQL • Row Level Security – Virtual Private Database • SSL support • Encryption  Password Encryption  Encryption For Specific Columns  Data Partition Encryption  Encrypting Data Across A Network • Data Masking • Audit  pgAudit – Extension
  • 13. Security Features in EPAS • All Security features of PostgreSQL • Password Policy • Code Protection • SQL Protect • Encryption  DBMS_CRYPTO • Data Masking  Data Redaction • Audit  EDB Audit
  • 14. Password Profile • Advanced Server allows a database superuser to create named profiles. Each profile defines rules for password management that augment password and md5 authentication. The rules in a profile can:  Count failed login attempts  Lock an account due to excessive failed login attempts  Mark a password for expiration  Define a grace period after a password expiration  Define rules for password complexity  Define rules that limit password re-use
  • 15. Code Protection • The EDB*Wrap utility protects proprietary source code and programs (functions, stored procedures, triggers, and packages) from unauthorized scrutiny. • The EDB*Wrap program translates a file that contains SPL or PL/pgSQL source code (the plaintext) into a file that contains the same code in a form that is nearly impossible to read. • Once you have the obfuscated form of the code, you can send that code to EPAS and it will store those programs in obfuscated form. • edbwrap does not validate SQL source code - if the plaintext form contains a syntax error, edbwrap will not complain but EPAS will report an error and abort the entire file when you try to execute the obfuscated form.
  • 16. SQL Protect • Guards against the various types of SQL injections.  Unauthorized Relations  Utility Commands  SQL Tautology  Unbounded DML Statements
  • 17. Encryption • DBMS_CRYPTO package provides functions and procedures that allow you to encrypt or decrypt RAW, BLOB or CLOB data. • DBMS_CRYPTO functions to generate cryptographically strong random values. • ENCRYPT function or procedure uses a user-specified algorithm, key, and optional initialization vector to encrypt RAW, BLOB or CLOB data. • DECRYPT function or procedure decrypts data using a user-specified cipher algorithm, key and optional initialization vector. • HASH function uses a user-specified algorithm to return the hash value of a RAW or CLOB value.
  • 18. Data Masking • Data Redaction limits sensitive data exposure by dynamically changing data as it is displayed for certain users. • Data redaction is implemented by defining a function for each field to which redaction is to be applied. The function returns the value that should be displayed to the users subject to the data redaction. • For example, bank account numbers as XXXXXX1235 • Supports DBMS_REDACT package
  • 19. Auditing • Advanced Server allows database and security administrators, auditors, and operators to track and analyze database activities using the EDB Audit Logging functionality. • EDB Audit Logging generates audit log files, which contains all of the relevant information.  The audit logs can be configured to record information such as:  When a role establishes a connection to an Advanced Server database  What database objects a role creates, modifies, or deletes when connected to Advanced Server  When any failed authentication attempts occur • Audit parameters specified in the configuration files, postgresql.conf or postgresql.auto.conf, control the information included in the audit logs. • EDB Audit files/logs can be generate in CSV or XML format
  • 20. Best Practices • Avoid to use default values  Change default port  Use non-default name for superuser. Can be specified during initdb  By default, each new database has connect privileges to public schema o Revoke connect on my_db from public; o Grant connect to my_db to my_app_user; • Control who can connect from where • Configure pg_hba.conf effectively • Avoid to use 0.0.0.0/0 • Avoid “trust” authentication • Allow DBAs to use their personal user_id (Ex. DBA Nishchay need to use user “nishchay”) • Application user should not have superuser privileges
  • 21. Best Practices • Password policy should be implemented • Use connection timeout, logging of connection & disconnection with duration • Use Grant & Revoke appropriately to control the access • Sensitive data should be masked • Apply patch on Time
  • 22. THANK YOU FOR ATTENDING THE WEBINAR