Secure Couchbase Clusters

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.
Course info
Level
Intermediate
Updated
Jun 26, 2020
Duration
2h 40m
Table of contents
Description
Course info
Level
Intermediate
Updated
Jun 26, 2020
Duration
2h 40m
Description

Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.

About the author
About the author

An engineer at heart, I am drawn to any interesting technical topic. Big Data, ML and Cloud are presently my topics of interest.

More from the author
Design Data Models for Couchbase
Beginner
2h 7m
Sep 29, 2020
Recognize the Need for Document Databases
Beginner
1h 40m
Sep 18, 2020
Integrate Couchbase into Your Data Environment
Intermediate
2h 48m
Sep 15, 2020
More courses by Kishan Iyer
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, and welcome to this course, Secure Couchbase Clusters. My name is Kishan Iyer, and I will be your instructor for this course. A little about myself first. I have a Masters degree in computer science from Columbia University and have previously worked in companies such as Deutsche Bank and WebMD in New York. I presently work for Loonycorn, a studio for high quality video content. Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In Couchbase, there are several factors related to security and privacy, and in this course, we cover the most crucial ones, user authentication and authorization, auditing activities, and encrypting communications. We begin by covering role‑based access control, or RBAC, and how it applies to the management of users, groups, and rules in Couchbase. We explore user management from the UI, and also, how this can be achieved programmatically using both the Couchbase CLI and REST API. We then move on to the auditing feature in Couchbase and how this can be used to track the activities of users, and also, the occurrence of a variety of events on a cluster. We also cover the use of the reduction feature when generating logs so that potentially sensitive information is not shared with outside parties. The course then turned its attention to the encryption of communication. We look into some of the encryption settings such a Cipher Suite, which can be configured for a cluster and the enabling of node to node encryption. And finally, we delve into the creation and installation of custom certificates in order to secure communications on a cluster. Once you have finished this course, you will be well versed in the options available to manage security on a Couchbase cluster from ensuring that the right people have the right degree of access, to ensuring that sensitive information is well protected, and that network traffic to and from your cluster is secured.