Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Secure Couchbase Clusters

via Pluralsight

Overview

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.

Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.

Taught by

Kishan Iyer

Reviews

Start your review of Secure Couchbase Clusters

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.