Ensure robust security and secure access to sensitive data for Spring Boot applications using YugabyteDB’s advanced security features, including TLS encryption, and native cloud secret management services like AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, or Hashicorp Vault.
Our team continues to deliver new innovations, so we are excited to announce our latest stable release—YugabyteDB 2.14, which delivers higher performance, security and YugabyteDB Anywhere enhancements.
YugabyteDB is quickly becoming the cloud native relational database for the world’s most demanding enterprises, driving data-driven innovation in the face of growth, uncertainty, and change.
If you are designing your architecture for stateful edge applications, here are some key principles and design patterns you should be aware of.
In the first post in this series, we covered how to secure YugabyteDB’s internal RPC protocol using the TLS encryption protocol, also referred to as server-to-server encryption in transit. In this post, we secure the communication between SQL clients and the PostgresQL query interface of YugabyteDB, also called client-to-server encryption in transit.
YugabyteDB—a 100% open source, distributed SQL database built to accelerate cloud native agility—stores important user and customer data at an organization.
Welcome back to our blog series about how different compliance and regulatory frameworks work and how YugabyteDB can be an essential part of a company’s compliance efforts. In this third installment, we focus on the PCI Security Standards Council’s Payment Card Industry Data Security Standard (PCI DSS). More specifically, we reveal how companies can use YugabyteDB to enable compliance with certain key PCI DSS requirements.
For further details, read our recently published Yugabyte PCI DSS Compliance Guide.
This is the first in a series of posts about how different compliance and regulatory frameworks work and how YugabyteDB can be an essential part of a company’s compliance efforts. This installment is an overview of the different international compliance frameworks companies encounter on their journeys with customers.
What’s the Purpose of a Compliance Framework?
A compliance framework is a set of guidelines, baselines and best practices used by companies to establish internal controls to meet regulatory requirements,
Run mission-critical applications at scale with enterprise-grade SLAs and security
Our mission at Yugabyte is to build the default distributed SQL database for cloud native applications in a multi-cloud world. We have been accelerating on this mission by bringing new features, growing our user base, and making our software as robust as possible. Today we are excited to announce the general availability of YugabyteDB 2.4 which includes major enhancements and provides enterprise-grade stability allowing you to deploy YugabyteDB in production environments.
The YugabyteDB 2.5 release adds many critical enterprise-grade security features. This blog post outlines these newly added features.
Adding scram-sha-256 authentication
The first notable addition is the addition of a much improved, password-based authentication mechanism called Salted Challenge Response Authentication Mechanism (or simply SCRAM) as described in RFC5802. This scram-sha-256 authentication mechanism, identical to the most secure PostgreSQL authentication schema,
Support for Geo-Partitioning and Enterprise-Grade Security Features
Our mission at Yugabyte is to build the default distributed SQL database for cloud native applications in a multi cloud world. To further that mission, this release brings major enhancements to multi-region deployments, performance, and security features offered by the database – while simultaneously improving on high availability, horizontal scalability, and ease of managing the database.
- Enhanced multi-region capabilities with geo-partitioning and follower reads: The YugabyteDB 2.5 release adds row-level geo-partitioning capabilities as well as follower reads to the extensive set of multi-region features that YugabyteDB already had.
Microservices architectures are becoming the de facto way developers are thinking about how their applications are constructed. But security remains a top concern for many organizations. Given the general trends of the proliferation of threats within the production network and the increased points of privileged access, it is increasingly necessary to adopt a zero-trust network security approach for microservices architectures.
One of the most common security approaches is to set up mTLS.