Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Data

Secure Couchbase 6 Clusters

Security in Couchbase spans a variety of topics, and this course focuses on the most important ones - user authentication and authorization, auditing activities, redacting sensitive data, and encrypting communications.

Kishan Iyer - Pluralsight course - Secure Couchbase 6 Clusters
by Kishan Iyer

What you'll learn

Once you begin scaling out your Couchbase cluster, the security of your database begins to take on more importance. In this course, Secure Couchbase Clusters, you'll explore the most crucial factors related to security and privacy in Couchbase. First, you'll discover Role-based access control (RBAC) and how it applies to the management of users, groups, and roles in Couchbase. Next, you'll learn about user management from the UI and how this can be achieved programmatically using the Couchbase CLI and the REST API. Then, you'll delve into the auditing feature in Couchbase and how this can be used to track the activities of users and the occurrence of a variety of events on a cluster. After that, you'll develop an understanding of the encryption settings such as cipher suites, and how to enable a node-to-node encryption. Finally, you'll explore the creation and installation of custom certificates to secure communications on a cluster. By the end of this course, you'll be well-versed in the options available to manage security on a Couchbase cluster - from ensuring that the right people have the right degree of access, that sensitive information is well-protected, and that network traffic to and from your cluster is secured.

Table of contents

About the author

Kishan Iyer - Pluralsight course - Secure Couchbase 6 Clusters
Kishan Iyer

An engineer at heart, I am drawn to any interesting technical topic. Big Data, ML and Cloud are presently my topics of interest.

More Courses by Kishan