Security compliance for Databases

Pankaj kushwaha
1 min readJan 13, 2021

--

1. Certifications:

Password complexity

The password cannot be repeated several times recently

Strategy for altering password expiration

A repeated login mistake exceeds the number of lockouts

Authentication wait after incorrect password

2. Link

Encrypting connections

Firewall the servers

Idle timeout for sessions

3. The Data

Encryption of data storage

Data encryption type

tde

Wal Encryption Log Storage

4. Auditing

Encryption of SQL Audit Storage

Audit sql, length of storage configurable, downloadable

GUI, audit with openapi

The closing audit act is audited

5. Recovery and Backup for Disasters

Recovery from disasters through machine rooms and regions

Pace for cross-machines, cross-regional backup

6. External access, external access

Encryption for External Access Connection (dblink, fdw)

Encrypted storage of account information for external access authentication (mapping, dblink, view)

7. Authentication Of

Database authority system,

GUI permission system,

Call permission system openapi call permission system

8. Encryption algorithm power

9. Supervision and warning

Monitoring mistake

Monitoring output

Error alert, warning against unavailability, performance warning

Uh. 10. Authorizations

Third-party authorization for troubleshooting

I like to learn new and better ways of doing things when working on a scale, and feel free to ask questions and make suggestions.
Also, check out another story on this.
Thanks for reading this.

--

--

Pankaj kushwaha
Pankaj kushwaha

Written by Pankaj kushwaha

Database/System Administrator | DevOPS | Cloud Specialist | DevOPS

No responses yet