Secure Couchbase 6 Clusters

by Kishan Iyer

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.

What you'll learn

Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.

About the author

I have a Masters in Computer Science from Columbia University and have worked previously as a developer and DevOps engineer. I now work at Loonycorn which is a studio for high-quality video content. My interests lie in the broad categories of Big Data, ML and Cloud.

Ready to upskill? Get started