Tag: Couchbase Security
Couchbase Server 7.0.2 Enforce TLS, HSTS & Enforce IP Address Family
In this blog post, I will introduce three new features in Couchbase Server 7.0.2 (“Server”) to help administrators deploy Couchbase Server in a secure manner: Enforce TLS, HSTS, and Enforce IP Address Family. When deploying a Couchbase Server cluster, a...
TLS 1.3 encryption arrives to Couchbase Server 7.0
The Couchbase Server 7.0 Beta is now available with some additional enhancements to strengthen the security of the platform. Couchbase uses TLS encryption across our portfolio to ensure communication across the network is secure, meaning that outside parties cannot eavesdrop...
At-rest data security with LUKS encryption
The Couchbase Server 7.0 Beta is now available with some additional enhancements to strengthen the security of the platform. Couchbase has always recommended that customers utilize disk encryption technologies to ensure that their data is secure as part of an...
Introducing RBAC Security for Collections
Couchbase Server 7.0 introduces the Role Based Access Control (RBAC) for Collections and Scopes.
Couchbase Server 5.5 Released
Announcing Couchbase Server 5.5 Couchbase Server 5.5 production release is now available! We are very excited to share more information about this substantial extension of the Couchbase Data Platform. This release introduces several new Enterprise Grade features relating to agility,...
Couchbase Server 5.5: Log Redaction
With security already a hot topic in the data space, the Couchbase Server 5.5 release introduces a new feature – “Log Redaction”. Logs are an important part of every platform. Logs are used for multiple purposes ranging from security, to monitoring,...
Speculative Execution Processor Vulnerabilities – Performance Impact Analysis
Last week, we published a blog with recommendation on securing Couchbase data platform in response to industry-wide security vulnerabilities. We continued to analyze the potential performance impact caused by the patched OS binaries and this blog post captures the detailed evaluation. As...
Using Role-Based Access Control in N1QL
In Couchbase 4.5, data was secured bucket by bucket. Each bucket had a password, and in order to access a bucket through a N1QL query, the user had to include the bucket password with the query. Passwordless buckets were possible,...
Configuring IPsec for a Couchbase Cluster
Introduction Some Couchbase deployments require secure communications between nodes across the network, this could be due to reasons like data governance policies or regulatory compliance. Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications by...