Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Secure Couchbase 6 Clusters

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.

Intermediate
2h 40m
(2)

Created by Kishan Iyer

Last Updated Jun 28, 2024

Course Thumbnail
  • Course

Secure Couchbase 6 Clusters

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.

Intermediate
2h 40m
(2)

Created by Kishan Iyer

Last Updated Jun 28, 2024

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Data
What you'll learn

Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.

Secure Couchbase 6 Clusters
Intermediate
2h 40m
(2)
Table of contents

About the author
Kishan Iyer - Pluralsight course - Secure Couchbase 6 Clusters
Kishan Iyer
40 courses 4.0 author rating 129 ratings

An engineer at heart, I am drawn to any interesting technical topic. Big Data, ML and Cloud are presently my topics of interest.

Get started with Pluralsight