SlideShare a Scribd company logo
CONFIDENTIAL © Copyright EnterpriseDB Corporation, 2019. All rights reserved.
Marc Linster
SVP, Product Development and Support
1
Creating a Multi-layered
Security Architecture
for Your Postgres
Databases
WHO IS EDB?
The world leader in
open-source based Postgres
software and services
2
• Founded in 2004
• Recognized RDBMS leader by:
• Gartner
• Forrester
• Customer base > 4000
• 300+ employees
• Offices worldwide
• Largest PostgreSQL
community leader
EDB POSTGRES SOLUTION USE CASES
New Applications
DevOps, schema-less rapid development, and
multiple programming language support
Application Modernization
Multi-model flexibility and integration with popular
data sources
Legacy Migration
Compatibility with Oracle leverages existing
DBA
and developer skills
3
Migration to Cloud
Flexible deployment options and simple
business terms
for moving to the cloud
Our customers rely on our expertise and solutions to develop new
applications, move applications to the cloud, modernize applications,
and migrate off legacy databases like Oracle.
ONLY OPEN
SOURCE BASED
RDBMS IN
GARTNER MQ
EDB Recognized 6 Years
In A Row on Gartner’s
Magic Quadrant
4
5
Customers working SMARTER, reducing RISK and being more PRODUCTIVE with EDB.
OVER 4,000 CUSTOMERS
U.S Customers
EMEA Customers APAC Customers
102
of the
Fortune 500
337
of the Forbes
Global 2000
EDB OPEN SOURCE LEADERSHIP
NAMED EDB OPEN SOURCE COMMITTERS AND CONTRIBUTORS
6
• CORE TEAM
• • •
• MAJOR CONTRIBUTORS • CONTRIBUTORS
Akshay
Joshi
Amul
Sul
Ashesh
Vashi
Dilip
Kumar
Jeevan
Ladhe
Mithun
Cy
Andres
Freund
Devrim
Gündüz
Thomas
Munro
Amit
Kapila
Bruce
Momjian
Dave
Page
Robert
Haas
Ashutosh
Sharma
Rushabh
Lathia
- designates committers
7
EDB Postgres Platform
8
Aspects of Data Security
Data
Security
Unauthorized
access
Data
corruption
Loss of
access
Data breaches
(Un)intentional corruption
Hardware failure
Operator error
Process failure
Loss of encryption keys
Network failure
Disaster recovery
Notification and compliance
9
Key Concepts: AAA
● Authentication: verify the user is who they claim to be
● Authorization: verify the user is allowed access to the
system and the data
● Auditing: record all database activity, including username
and time
10
KEY CONCEPTS: MULTIPLE BARRIERS
● Secure physical access to the host
● Limited access to the network
● Limited access to the database host
● Limited access to the database application
● Limited access to the data in the database
11
DB Host
Database files
Data
base
Data
base
Data
baseData access control:
• Tables
• Columns
• Rows
• Views
• Security barriers
DB Server
Authentication:
• Users
• Roles
• Password profiles
Data Center Physical access
Host access
DB Server network
access
File system encryption
Data file encryption
Data encryption
• Column based
encryption
DML/DDL Auditing
SQL Injection Attack
Prevention
Encryption in transit w.
host authentication
Data
redaction/masking
Key
Management
System
MULTIPLE LAYERS OF SECURITY
12
MULTIPLE BARRIERS
1. Physical access (locks on doors, cameras, etc.): If a data center is
not physically protected, all other data security measures become
significantly less valuable.
2. Host access (Operating System controls): Securing access at the
host-level ensures no users have unfettered access to the database
host.
3. DB Server Network Access: Through Postgres’s hba.conf,
connections to the database server can be controlled and limited.
4. File system encryption (through native Linux or third-party
solutions): Encrypting the file system protects the files on the drive if
the drive is stolen. Third party solutions can also leverage third- party
key management systems
13
MULTIPLE BARRIERS
5. SQL injection attack prevention: SQL injection attack prevention
blocks corruption or co-opting of a database, including unauthorized
relations, utility commands, SQL tautology, and unbounded DML.
6. Database authentication: Passwords, LDAP, Keberos, certificates or
using operating systems credentials. Database authentication should
be tied with overall user management to make sure access credentials
get revoked when users leave the business or cease to be customers.
7. Database authorization and access control: Users must be
granted permissions to view and work with data in the database.
A principle of least privilege should be applied.
14
MULTIPLE BARRIERS
9. File system encryption (native Linux or third-party): Encrypting the
file system protects the files on the drive if the drive is stolen. Third
party solutions can leverage third- party key management systems
10. Data encryption (pgCrypto): If a user gets past file system
encryption, they can access a database that’s been logged into.
Encrypting data at the column level keeps the database information
secure.
11. Auditing: Track and analyze database activities, like the creation,
changing, or deletion of data. EDB recommends auditing based on
user connections, DDL changes, data changes, and data views.
12. Data redaction: Data redaction shields certain data elements from
certain types of users, like Social Security numbers.
15
EXAMPLE: DATA REDACTION
15
Username [enterprisedb]: privilegeduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00
1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00
1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00
(3 rows)
Username [enterprisedb]: redacteduser
mycompany=> select * from employees;
id | name | ssn | phone | birthday
----+--------------+-------------+------------+--------------------
1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00
1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00
1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00
(3 rows)
16
ADVANTAGES OF EDB POSTGRES
● SQL Injection Attack Prevention
● Password Profiles: Complexity rules, expiration, etc
● Auditing: DML auditing for INSERT, UPDATE, DELETE, TRUNCATE
by user and database, syslog integration, etc.
⇒ Manage audit logs separately from server logs ⇐
● Data Redaction (EPAS 11)
17
Conclusions
● AAA:
○ Authentication
○ Authorization
○ Auditing
● Multi-layered security
measures
● Protection and security
includes:
○ Physical security
○ Network security
○ Host security
○ Application security
○ Data security
18
RESOURCES
Webinar: 5 Ways to Make Your PostgreSQL GDPR-ready
Blog: Native Data Redaction Capability in EDB Postgres Advanced Server 11
Blog: EDB Postgres Secure Technology Implementation Guide
Blog: Managing Roles with Password Profiles: Part 1-3
Contact Information, info@enterprisedb.com
QUESTIONS & DISCUSSION
19

More Related Content

PPTX
Whats New in Postgres 12
 
PDF
EPAS + Cloud = Oracle Compatible Postgres in Minutes
 
PDF
Best Practices for Monitoring Postgres
 
PPTX
No Time to Waste: Migrate from Oracle to Postgres in Minutes
 
PDF
Managing Postgres at Scale With Postgres Enterprise Manager
 
PDF
EDB & ELOS Technologies - Break Free from Oracle
 
PPTX
Where Should You Deliver Database Services From?
 
PDF
Transform Your DBMS to Drive Application Innovation
 
Whats New in Postgres 12
 
EPAS + Cloud = Oracle Compatible Postgres in Minutes
 
Best Practices for Monitoring Postgres
 
No Time to Waste: Migrate from Oracle to Postgres in Minutes
 
Managing Postgres at Scale With Postgres Enterprise Manager
 
EDB & ELOS Technologies - Break Free from Oracle
 
Where Should You Deliver Database Services From?
 
Transform Your DBMS to Drive Application Innovation
 

What's hot (20)

PPTX
Oracle Migration to Postgres in the Cloud
 
PPTX
Webinar: Managing Postgres at Scale
 
PDF
Using PEM to understand and improve performance in Postgres: Postgres Tuning ...
 
PDF
EDB Postgres Platform
 
PDF
Best Practices in Security with PostgreSQL
 
PPTX
Ein Expertenleitfaden für die Migration von Legacy-Datenbanken zu PostgreSQL
 
PPTX
Break Free from Oracle
 
PDF
Transform DBMS to Drive Apps of Engagement Innovation
 
PDF
Postgres Integrates Effectively in the "Enterprise Sandbox"
 
PPTX
Migrate Today: Proactive Steps to Unhook from Oracle
 
PDF
No Time to Waste: Migrate from Oracle to EDB Postgres in Minutes
 
PDF
How to Build On-demand Oracle Compatible Postgres Database in Minutes
 
PDF
Optimize with Open Source
 
PPTX
Advanced Database Patterns for Kubernetes
 
PPTX
Best Practices in Security with PostgreSQL
 
PDF
Remote DBA Service: Powering your DBA needs
 
PDF
Keynote: The Postgres Ecosystem
 
PPTX
New Approaches to Integrating Oracle and Postgres Database Strategies
 
PDF
Drive DBMS Transformation with EDB Postgres
 
PDF
Reducing Database Pain & Costs with Postgres
 
Oracle Migration to Postgres in the Cloud
 
Webinar: Managing Postgres at Scale
 
Using PEM to understand and improve performance in Postgres: Postgres Tuning ...
 
EDB Postgres Platform
 
Best Practices in Security with PostgreSQL
 
Ein Expertenleitfaden für die Migration von Legacy-Datenbanken zu PostgreSQL
 
Break Free from Oracle
 
Transform DBMS to Drive Apps of Engagement Innovation
 
Postgres Integrates Effectively in the "Enterprise Sandbox"
 
Migrate Today: Proactive Steps to Unhook from Oracle
 
No Time to Waste: Migrate from Oracle to EDB Postgres in Minutes
 
How to Build On-demand Oracle Compatible Postgres Database in Minutes
 
Optimize with Open Source
 
Advanced Database Patterns for Kubernetes
 
Best Practices in Security with PostgreSQL
 
Remote DBA Service: Powering your DBA needs
 
Keynote: The Postgres Ecosystem
 
New Approaches to Integrating Oracle and Postgres Database Strategies
 
Drive DBMS Transformation with EDB Postgres
 
Reducing Database Pain & Costs with Postgres
 
Ad

Similar to Creating a Multi-Layered Secured Postgres Database (20)

PDF
Best Practices in Security with PostgreSQL
 
PDF
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
PPTX
Enterprise-class security with PostgreSQL - 1
PPTX
5 Ways to Make Your Postgres GDPR-Ready
 
PPTX
GDPR Webinar January 2018
 
PPTX
PostgreSQL Security. How Do We Think?
PDF
Achieving Pci Compliace
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
PDF
New enhancements for security and usability in EDB 13
 
PDF
Transparent Data Encryption in PostgreSQL
PDF
PostgreSQL Security. How Do We Think? at PGCon 2017
PPTX
New enhancements for security and usability in EDB 13
 
DOCX
Database Security – Issues and Best PracticesOutline
PDF
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
PPT
SQL Server 2008 Security Overview
PDF
Expanding with EDB Postgres Advanced Server 9.5
 
PPTX
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PDF
Security Best Practices for your Postgres Deployment
PDF
PgDay Asia 2016 - Security Best Practices for your Postgres Deployment
Best Practices in Security with PostgreSQL
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Enterprise-class security with PostgreSQL - 1
5 Ways to Make Your Postgres GDPR-Ready
 
GDPR Webinar January 2018
 
PostgreSQL Security. How Do We Think?
Achieving Pci Compliace
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
New enhancements for security and usability in EDB 13
 
Transparent Data Encryption in PostgreSQL
PostgreSQL Security. How Do We Think? at PGCon 2017
New enhancements for security and usability in EDB 13
 
Database Security – Issues and Best PracticesOutline
Transparent Data Encryption in PostgreSQL and Integration with Key Management...
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
SQL Server 2008 Security Overview
Expanding with EDB Postgres Advanced Server 9.5
 
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
Security Best Practices for your Postgres Deployment
PgDay Asia 2016 - Security Best Practices for your Postgres Deployment
Ad

More from EDB (20)

PDF
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
 
PDF
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
 
PDF
Migre sus bases de datos Oracle a la nube
 
PDF
EFM Office Hours - APJ - July 29, 2021
 
PDF
Benchmarking Cloud Native PostgreSQL
 
PDF
Las Variaciones de la Replicación de PostgreSQL
 
PDF
NoSQL and Spatial Database Capabilities using PostgreSQL
 
PDF
Is There Anything PgBouncer Can’t Do?
 
PDF
Data Analysis with TensorFlow in PostgreSQL
 
PDF
Practical Partitioning in Production with Postgres
 
PDF
A Deeper Dive into EXPLAIN
 
PDF
IOT with PostgreSQL
 
PDF
A Journey from Oracle to PostgreSQL
 
PDF
Psql is awesome!
 
PDF
EDB 13 - New Enhancements for Security and Usability - APJ
 
PPTX
Comment sauvegarder correctement vos données
 
PDF
Cloud Native PostgreSQL - Italiano
 
PDF
Cloud Native PostgreSQL - APJ
 
PDF
EDB Postgres & Tools in a Smart City Project
 
PDF
All you need to know about CREATE STATISTICS
 
Cloud Migration Paths: Kubernetes, IaaS, or DBaaS
 
Die 10 besten PostgreSQL-Replikationsstrategien für Ihr Unternehmen
 
Migre sus bases de datos Oracle a la nube
 
EFM Office Hours - APJ - July 29, 2021
 
Benchmarking Cloud Native PostgreSQL
 
Las Variaciones de la Replicación de PostgreSQL
 
NoSQL and Spatial Database Capabilities using PostgreSQL
 
Is There Anything PgBouncer Can’t Do?
 
Data Analysis with TensorFlow in PostgreSQL
 
Practical Partitioning in Production with Postgres
 
A Deeper Dive into EXPLAIN
 
IOT with PostgreSQL
 
A Journey from Oracle to PostgreSQL
 
Psql is awesome!
 
EDB 13 - New Enhancements for Security and Usability - APJ
 
Comment sauvegarder correctement vos données
 
Cloud Native PostgreSQL - Italiano
 
Cloud Native PostgreSQL - APJ
 
EDB Postgres & Tools in a Smart City Project
 
All you need to know about CREATE STATISTICS
 

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Advanced IT Governance
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
Sensors and Actuators in IoT Systems using pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Monthly Chronicles - July 2025
Transforming Manufacturing operations through Intelligent Integrations
Chapter 3 Spatial Domain Image Processing.pdf
madgavkar20181017ppt McKinsey Presentation.pdf
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Advanced IT Governance
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Sensors and Actuators in IoT Systems using pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?

Creating a Multi-Layered Secured Postgres Database

  • 1. CONFIDENTIAL © Copyright EnterpriseDB Corporation, 2019. All rights reserved. Marc Linster SVP, Product Development and Support 1 Creating a Multi-layered Security Architecture for Your Postgres Databases
  • 2. WHO IS EDB? The world leader in open-source based Postgres software and services 2 • Founded in 2004 • Recognized RDBMS leader by: • Gartner • Forrester • Customer base > 4000 • 300+ employees • Offices worldwide • Largest PostgreSQL community leader
  • 3. EDB POSTGRES SOLUTION USE CASES New Applications DevOps, schema-less rapid development, and multiple programming language support Application Modernization Multi-model flexibility and integration with popular data sources Legacy Migration Compatibility with Oracle leverages existing DBA and developer skills 3 Migration to Cloud Flexible deployment options and simple business terms for moving to the cloud Our customers rely on our expertise and solutions to develop new applications, move applications to the cloud, modernize applications, and migrate off legacy databases like Oracle.
  • 4. ONLY OPEN SOURCE BASED RDBMS IN GARTNER MQ EDB Recognized 6 Years In A Row on Gartner’s Magic Quadrant 4
  • 5. 5 Customers working SMARTER, reducing RISK and being more PRODUCTIVE with EDB. OVER 4,000 CUSTOMERS U.S Customers EMEA Customers APAC Customers 102 of the Fortune 500 337 of the Forbes Global 2000
  • 6. EDB OPEN SOURCE LEADERSHIP NAMED EDB OPEN SOURCE COMMITTERS AND CONTRIBUTORS 6 • CORE TEAM • • • • MAJOR CONTRIBUTORS • CONTRIBUTORS Akshay Joshi Amul Sul Ashesh Vashi Dilip Kumar Jeevan Ladhe Mithun Cy Andres Freund Devrim Gündüz Thomas Munro Amit Kapila Bruce Momjian Dave Page Robert Haas Ashutosh Sharma Rushabh Lathia - designates committers
  • 8. 8 Aspects of Data Security Data Security Unauthorized access Data corruption Loss of access Data breaches (Un)intentional corruption Hardware failure Operator error Process failure Loss of encryption keys Network failure Disaster recovery Notification and compliance
  • 9. 9 Key Concepts: AAA ● Authentication: verify the user is who they claim to be ● Authorization: verify the user is allowed access to the system and the data ● Auditing: record all database activity, including username and time
  • 10. 10 KEY CONCEPTS: MULTIPLE BARRIERS ● Secure physical access to the host ● Limited access to the network ● Limited access to the database host ● Limited access to the database application ● Limited access to the data in the database
  • 11. 11 DB Host Database files Data base Data base Data baseData access control: • Tables • Columns • Rows • Views • Security barriers DB Server Authentication: • Users • Roles • Password profiles Data Center Physical access Host access DB Server network access File system encryption Data file encryption Data encryption • Column based encryption DML/DDL Auditing SQL Injection Attack Prevention Encryption in transit w. host authentication Data redaction/masking Key Management System MULTIPLE LAYERS OF SECURITY
  • 12. 12 MULTIPLE BARRIERS 1. Physical access (locks on doors, cameras, etc.): If a data center is not physically protected, all other data security measures become significantly less valuable. 2. Host access (Operating System controls): Securing access at the host-level ensures no users have unfettered access to the database host. 3. DB Server Network Access: Through Postgres’s hba.conf, connections to the database server can be controlled and limited. 4. File system encryption (through native Linux or third-party solutions): Encrypting the file system protects the files on the drive if the drive is stolen. Third party solutions can also leverage third- party key management systems
  • 13. 13 MULTIPLE BARRIERS 5. SQL injection attack prevention: SQL injection attack prevention blocks corruption or co-opting of a database, including unauthorized relations, utility commands, SQL tautology, and unbounded DML. 6. Database authentication: Passwords, LDAP, Keberos, certificates or using operating systems credentials. Database authentication should be tied with overall user management to make sure access credentials get revoked when users leave the business or cease to be customers. 7. Database authorization and access control: Users must be granted permissions to view and work with data in the database. A principle of least privilege should be applied.
  • 14. 14 MULTIPLE BARRIERS 9. File system encryption (native Linux or third-party): Encrypting the file system protects the files on the drive if the drive is stolen. Third party solutions can leverage third- party key management systems 10. Data encryption (pgCrypto): If a user gets past file system encryption, they can access a database that’s been logged into. Encrypting data at the column level keeps the database information secure. 11. Auditing: Track and analyze database activities, like the creation, changing, or deletion of data. EDB recommends auditing based on user connections, DDL changes, data changes, and data views. 12. Data redaction: Data redaction shields certain data elements from certain types of users, like Social Security numbers.
  • 15. 15 EXAMPLE: DATA REDACTION 15 Username [enterprisedb]: privilegeduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | 020-78-9345 | 5081234567 | 02-FEB-61 00:00:00 1 | Jane Doe | 123-33-9345 | 6171234567 | 14-FEB-63 00:00:00 1 | Bill Foo | 123-89-9345 | 9781234567 | 14-FEB-63 00:00:00 (3 rows) Username [enterprisedb]: redacteduser mycompany=> select * from employees; id | name | ssn | phone | birthday ----+--------------+-------------+------------+-------------------- 1 | Sally Sample | xxx-xx-9345 | 5081234567 | 02-FEB-02 00:00:00 1 | Jane Doe | xxx-xx-9345 | 6171234567 | 14-FEB-02 00:00:00 1 | Bill Foo | xxx-xx-9345 | 9781234567 | 14-FEB-02 00:00:00 (3 rows)
  • 16. 16 ADVANTAGES OF EDB POSTGRES ● SQL Injection Attack Prevention ● Password Profiles: Complexity rules, expiration, etc ● Auditing: DML auditing for INSERT, UPDATE, DELETE, TRUNCATE by user and database, syslog integration, etc. ⇒ Manage audit logs separately from server logs ⇐ ● Data Redaction (EPAS 11)
  • 17. 17 Conclusions ● AAA: ○ Authentication ○ Authorization ○ Auditing ● Multi-layered security measures ● Protection and security includes: ○ Physical security ○ Network security ○ Host security ○ Application security ○ Data security
  • 18. 18 RESOURCES Webinar: 5 Ways to Make Your PostgreSQL GDPR-ready Blog: Native Data Redaction Capability in EDB Postgres Advanced Server 11 Blog: EDB Postgres Secure Technology Implementation Guide Blog: Managing Roles with Password Profiles: Part 1-3