Secure Couchbase Clusters
Offered By: Pluralsight
Course Description
Overview
Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.
Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.
Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.
Syllabus
- Course Overview 2mins
- Configuring and Managing Users 35mins
- Managing Users Programatically 28mins
- Monitoring Activity Using Logs 34mins
- Securing and Managing Clusters 20mins
- Creating Certificates for a Cluster 39mins
Taught by
Kishan Iyer
Related Courses
Learn Angular Routing by building a Cocktails ApplicationCoursera Project Network via Coursera API Security on Google Cloud's Apigee API Platform
Google Cloud via Coursera Authentication and Authorization with AWS Identity and Access Management (Simplified Chinese)
Amazon Web Services via AWS Skill Builder Authentication and Authorization with AWS Identity and Access Management (German)
Amazon Web Services via AWS Skill Builder Authentication and Authorization with AWS Identity and Access Management (French)
Amazon Web Services via AWS Skill Builder