Services
24×7×365 Technical Support
Migration to PostgreSQL
High Availability Deployment
Database Audit
Remote DBA for PostgreSQL
Products
Postgres Pro Enterprise
Postgres Pro Standard
Cloud Solutions
Postgres Extensions
Resources
Blog
Documentation
Webinars
Videos
Presentations
Community
Events
Training Courses
Books
Demo Database
Mailing List Archives
About
Leadership team
Partners
Customers
In the News
Press Releases
Press Info
Services
24×7×365 Technical Support
Migration to PostgreSQL
High Availability Deployment
Database Audit
Remote DBA for PostgreSQL
Products
Postgres Pro Enterprise
Postgres Pro Standard
Cloud Solutions
Postgres Extensions
Resources
Blog
Documentation
Webinars
Videos
Presentations
Community
Events
Training Courses
Books
Demo Database
Mailing List Archives
About
Leadership team
Partners
Customers
In the News
Press Releases
Press Info
Facebook
Downloads
Home
>
mailing lists
Protecting sensitive data over NetApp - Mailing list pgsql-hackers
From
Liran's Lab
Subject
Protecting sensitive data over NetApp
Date
May 1, 2018
10:33:04
Msg-id
CACoc41WYQK4S4ODZ+617E520zB_8jSUi8+UqqS3fpB5UwFtmkg@mail.gmail.com
Whole thread
Raw
Responses
Re: Protecting sensitive data over NetApp
List
pgsql-hackers
Tree view
PostgreSQL 9.4
Current setup is one standalone server with disk mount on NetApp.
Data should be protected from access by other sources.
For example - if for some reason one of the Netapp admins mount the Postgres LUN to another server.
One option is to stored data locally - but then it is limited by capacity (and costly)
The second option is to encrypt the data.
Since 3rd party is generating the data we cant touch the schema and add crypt function on the sensitive fields - tables are also too dynamic.
What would be the best (easy to implement, least affecting on performance ) option to implement from the suggested options:
https://www.postgresql.org/
docs/8.1/static/encryption-
options.html
Would you recommend other options like:
safenet:
https://safenet.gemalto.com/data-encryption/postgresql-database-encryption/
cybertec:
https://www.cybertec-postgresql.com/en/products/postgresql-instance-level-encryption/
After reading:
https://www.enterprisedb.com/blog/postgres-and-transparent-data-encryption-tde
I tend to think that the
File system-level encryption
might be the best solution.
Thanks,
Liran.
pgsql-hackers
by date:
Previous
From:
Amit Langote
Date:
01 May 2018, 10:16:35
Subject:
stats_ext test fails with -DCATCACHE_FORCE_RELEASE
Next
From:
Craig Ringer
Date:
01 May 2018, 10:38:21
Subject:
Re: Protecting sensitive data over NetApp
Есть вопросы? Напишите нам!
Соглашаюсь с условиями обработки персональных данных
I confirm that I have read and accepted PostgresPro’s
Privacy Policy
.
I agree to get Postgres Pro discount offers and other marketing communications.
✖
×
×
Everywhere
Documentation
Mailing list
List:
all lists
pgsql-general
pgsql-hackers
buildfarm-members
pgadmin-hackers
pgadmin-support
pgsql-admin
pgsql-advocacy
pgsql-announce
pgsql-benchmarks
pgsql-bugs
pgsql-chat
pgsql-cluster-hackers
pgsql-committers
pgsql-cygwin
pgsql-docs
pgsql-hackers-pitr
pgsql-hackers-win32
pgsql-interfaces
pgsql-jdbc
pgsql-jobs
pgsql-novice
pgsql-odbc
pgsql-patches
pgsql-performance
pgsql-php
pgsql-pkg-debian
pgsql-pkg-yum
pgsql-ports
pgsql-rrreviewers
pgsql-ru-general
pgsql-sql
pgsql-students
pgsql-testers
pgsql-translators
pgsql-www
psycopg
Period
anytime
within last day
within last week
within last month
within last 6 months
within last year
Sort by
date
reverse date
rank
Services
24×7×365 Technical Support
Migration to PostgreSQL
High Availability Deployment
Database Audit
Remote DBA for PostgreSQL
Products
Postgres Pro Enterprise
Postgres Pro Standard
Cloud Solutions
Postgres Extensions
Resources
Blog
Documentation
Webinars
Videos
Presentations
Community
Events
Training Courses
Books
Demo Database
Mailing List Archives
About
Leadership team
Partners
Customers
In the News
Press Releases
Press Info
By continuing to browse this website, you agree to the use of cookies. Go to
Privacy Policy
.
I accept cookies