Introducing Crunchy Data Warehouse: A next-generation Postgres-native data warehouse. Crunchy Data Warehouse Learn more

Posts about Security

  • 3 min read

    Crunchy Data PostgreSQL 16 Security Technical Implementation Guide Released by DISA

    Doug Hunley

    Crunchy Data is pleased to announce the publication of the Crunchy Data PostgreSQL 16 Security Technical Implementation Guide

    Read More
  • 7 min read

    The Vectors of Database Encryption

    Keith Fiske

    One of the most requested features by Crunchy Data customers using modern enterprise database environments is some form of data encryption. However, nailing down exactly what someone means when they say "We need our data encrypted" is often a challenge due to the actual requirements not being fully clarified or even understood. So, before anyone tries to implement database encryption it is critically important to understand what needs to be encrypted and what benefit is actually gained by the methods that are employed. This blog post is not going to discuss any deep technical implementations of encryption. Instead, let's discuss what vectors of attack any given encryption method will mitigate since that will greatly influence which method is effective before you even reach any sort of development or deployment phases.

    The application of encryption to a database environment can be broken down into three different methods:

    1. Data-At-Rest
    2. Data-In-Transit
    3. Data-In-Use
    Read More
  • 8 min read

    Safer Application Users in Postgres

    Mike Palmiotto

    We deleted our database.

    Two years ago on a Friday afternoon around 4pm I had a customer open a support ticket. The customer thought they were running their test suite against a dev environment. In reality they were running on production. One of the early steps in many test suites is to ensure a clean state:

    1. DROP
    Read More
  • 14 min read

    Secure Permissions for pgBackRest

    Greg Sabino Mullane

    The pgBackRest tool is a fantastic backup solution for Postgres, with many features including encryption, compression, automatic expiration, PITR, asynchronous archiving, and lots more. By default it runs as the Unix user "postgres" and connects to the database as the "postgres" superuser. In working with one of our finance clients on Crunchy High Availability Postgres

    Read More
  • 4 min read

    Secure PostgreSQL 14 with CIS Benchmark

    Douglas Hunley

    Crunchy Data is proud to announce an update to the CIS PostgreSQL Benchmark by the Center for Internet Security (CIS). CIS is a nonprofit organization that publishes best practices and standards for securing modern technology and systems. This newly published CIS PostgreSQL 14 Benchmark ads to the existing CIS Benchmarks for PostgreSQL 9.5 - 13 and builds upon Crunchy Data's ongoing efforts with the PostgreSQL Security Technical Implementation Guide

    Read More
  • 7 min read

    Database Security Best Practices on Kubernetes

    Jonathan S. Katz

    As more data workloads shift to running on Kubernetes, one of the important topics to consider is security of your data. Kubernetes brings many conveniences for securing workloads with the ability to extend security functionality databases through the use of the Operator pattern

    Read More
  • 6 min read

    Is Postgres Secure?

    Paul Laurence

    With the rise of Postgres, new organizations are evaluating how to benefit from its power and flexibility. As that evaluation progresses, Postgres advocates must address the question, "Is Postgres secure?"

    There are a variety of ways to answer this question, but the short answer is a confident "Yes!"

    At Crunchy Data,

    Read More
  • 4 min read

    Enhancing PostgreSQL 13 Security with the CIS Benchmark

    Douglas Hunley

    Crunchy Data has recently announced an update to the CIS PostgreSQL Benchmark by the Center for Internet Security, a nonprofit organization that provides publications around standards and best practices for securing technologies systems. This newly published CIS PostgreSQL 13 Benchmark joins the existing CIS Benchmarks for PostgreSQL 9.5, 9.6, 10, 11, and 12 while continuing to build upon the PostgreSQL Security Technical Implementation Guide

    Read More
  • 9 min read

    Postgres and Crypto Supply Chain of Integrity

    Joe Conway

    Question: How do I get PostgreSQL to use FIPS 140-2 crypto?

    The answer, to some extent, depends on how rigorously you need to be able to prove your answer. If the proof required is more than a casual check, the process is not well documented as far as I can tell. Therefore I will attempt to address that deficiency here.

    To be sure the crypto being used by PostgreSQL on a particular system is FIPS validated, you need to trace the chain of custody of the crypto software from the PostgreSQL backend process all the way back to the actual binary that was tested.

    At a high level, that process involves the following steps:

    1. Which NIST Certificate Number applies to my OS?
    2. Which Vendor and Security Policy document belongs to that certificate?
    3. What version openssl RPM does that Security Policy require?
    4. Does my System Under Test
    Read More
  • 7 min read

    Deploy PostgreSQL With TLS in Kubernetes

    Jonathan S. Katz

    Ensuring data can be securely transmitted is a requirement of many production systems. PostgreSQL supports TLS as a means of encrypting network communication, verifying hosts, and allowing for certificate-based authentication

    Read More