Tag: Couchbase Security

Couchbase Server 7.0.2 Enforce TLS, HSTS & Enforce IP Address Family

Couchbase Server 7.0.2 Enforce TLS, HSTS & Enforce IP Address Family

In this blog post, I will introduce three new features in Couchbase Server 7.0.2 (“Server”) to help administrators deploy Couchbase Server in a secure manner: Enforce TLS, HSTS, and Enforce IP Address Family.  When deploying a Couchbase Server cluster, a...

shyamraj December 14, 2021
TLS 1.3 encryption arrives to Couchbase Server 7.0

TLS 1.3 encryption arrives to Couchbase Server 7.0

The Couchbase Server 7.0 Beta is now available with some additional enhancements to strengthen the security of the platform.  Couchbase uses TLS encryption across our portfolio to ensure communication across the network is secure, meaning that outside parties cannot eavesdrop...

james.oquendo December 14, 2020
At-rest data security with LUKS encryption

At-rest data security with LUKS encryption

The Couchbase Server 7.0 Beta is now available with some additional enhancements to strengthen the security of the platform. Couchbase has always recommended that customers utilize disk encryption technologies to ensure that their data is secure as part of an...

james.oquendo December 8, 2020
Introducing RBAC Security for Collections

Introducing RBAC Security for Collections

Couchbase Server 7.0 introduces the Role Based Access Control (RBAC) for Collections and Scopes.

james.oquendo November 18, 2020
Couchbase Server 5.5 Released

Couchbase Server 5.5 Released

Announcing Couchbase Server 5.5 Couchbase Server 5.5 production release is now available! We are very excited to share more information about this substantial extension of the Couchbase Data Platform. This release introduces several new Enterprise Grade features relating to agility,...

james.oquendo July 23, 2018
Couchbase Server 5.5: Log Redaction

Couchbase Server 5.5: Log Redaction

With security already a hot topic in the data space, the Couchbase Server 5.5 release introduces a new feature – “Log Redaction”. Logs are an important part of every platform.  Logs are used for multiple purposes ranging from security, to monitoring,...

james.oquendo March 13, 2018
Speculative Execution Processor Vulnerabilities – Performance Impact Analysis

Speculative Execution Processor Vulnerabilities – Performance Impact Analysis

Last week, we published a blog with recommendation on securing Couchbase data platform in response to industry-wide security vulnerabilities. We continued to analyze the potential performance impact caused by the patched OS binaries and this blog post captures the detailed evaluation. As...

james.oquendo January 16, 2018
Using Role-Based Access Control in N1QL

Using Role-Based Access Control in N1QL

In Couchbase 4.5, data was secured bucket by bucket. Each bucket had a password, and in order to access a bucket through a N1QL query, the user had to include the bucket password with the query. Passwordless buckets were possible,...

james.oquendo October 23, 2017
Configuring IPsec for a Couchbase Cluster

Configuring IPsec for a Couchbase Cluster

Introduction Some Couchbase deployments require secure communications between nodes across the network, this could be due to reasons like data governance policies or regulatory compliance.  Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications by...

james.oquendo July 15, 2016