Skillnad mellan versioner av "MariaDB"

Från wiki.soltec.se
Hoppa till: navigering, sök
(MariaDB info)
 
Rad 1: Rad 1:
 
MariaDB TX keeps your data safe and your applications running.
 
MariaDB TX keeps your data safe and your applications running.
  
[[Fil:Exempel.jpg]]
+
<UL>
 +
<li>Encryption: TLS for encrypted connections and AES for encrypted Storage. To counter "Man-in-the-Middle", Package sniffing, Compromised Architecture and Internal bad actors. N.B! SPARC sun4v CPU has this encryption already built into the chip hardware so increasing database performance</li>
 +
 
 +
<li>Database Proxy: Query whitelisting/blacklisting and Data masking. To counter DoS, SQL Injection, Application spoofing. N.B! All of these are protected by software in silicon på SPARC M7 CPUs. </li>
 +
 
 +
<li>User Management: LDAP user & group mapping, RBAC, PAM authentication, Password validation. To counter compromised application servers, Human error and Bad actors. Compatible with standard Linux tools for connecting with AD authentication using SSD, PAM, Samba and Kerberos.</li>
 +
 
 +
<li>Auditing: Local autdit logs, Remote centralised audit logs. To counter lack of visibility in security breaches Unmet compliance regualation and GDPR regulations (Req'd by EU to be implemented by May 2018)</li>
 +
</ul>

Versionen från 5 september 2017 kl. 22.24

MariaDB TX keeps your data safe and your applications running.

  • Encryption: TLS for encrypted connections and AES for encrypted Storage. To counter "Man-in-the-Middle", Package sniffing, Compromised Architecture and Internal bad actors. N.B! SPARC sun4v CPU has this encryption already built into the chip hardware so increasing database performance
  • Database Proxy: Query whitelisting/blacklisting and Data masking. To counter DoS, SQL Injection, Application spoofing. N.B! All of these are protected by software in silicon på SPARC M7 CPUs.
  • User Management: LDAP user & group mapping, RBAC, PAM authentication, Password validation. To counter compromised application servers, Human error and Bad actors. Compatible with standard Linux tools for connecting with AD authentication using SSD, PAM, Samba and Kerberos.
  • Auditing: Local autdit logs, Remote centralised audit logs. To counter lack of visibility in security breaches Unmet compliance regualation and GDPR regulations (Req'd by EU to be implemented by May 2018)