Presented by:

7c069e16a049f9e562e165ab5e3d9cd1

Nishchay Kothari

from Fujitsu

Technical consultant at Fujitsu

Checkout the slides

Why Your Security Best Practices Don’t Work

Data breaches damage a company's reputation, destroy customer confidence, and can have major financial and legal implications. But you’re ahead of the game, and have adopted new PostgreSQL solution with built-in security offerings.

Naturally, your next step is to download the obligatory Security Best Practice document from your new vendors website, right? As soon as your infosec team executes a security scan, all the fire alarms to go off. What went wrong?

In this session, we will discuss how to implement best security practices for sensitive data using procedures such as;

• Transparent Data Encryption • Data Masking • Dedicated Audit Logging • GDPR, and general best practice of securing data.

I will not only explain the importance of a Security Best Practice document, but also explore Best Practice Security Settings and how to effectively use them to secure your PostgreSQL database - Because setting up parameters without understanding the basic concepts and impacts behind them is equivalent to not setting them at all.

Date:
2024 February 29 - 14:00
Duration:
40 min
Room:
Grand Victoria A
Conference:
PGConf India, 2024
Language:
Track:
Database Administration
Difficulty:
Easy

Happening at the same time:

  1. An Introduction to PostGIS, H3 and its Integration with Greenplum
  2. Start Time:
    2024 February 29 14:00

    Room:
    Robusta + Arabica

  3. Postgres for analytics
  4. Start Time:
    2024 February 29 14:00

    Room:
    Grand Victoria B