Greenplum Database Security Configuration Guide
Important: Because Tanzu Greenplum is based on PostgreSQL, certain commercial security scanning software, when trying to identify Tanzu Greenplum Database vulnerabilities, may use a PostgreSQL database profile. The reports generated by these tools can produce misleading results, and cannot be trusted as an accurate assessment of vulnerabilities that may exist in Tanzu Greenplum. For further assistance, or to report any specific Tanzu Greenplum security concerns, refer to the VMware Tanzu Security Response Center guidelines.
Because Greenplum Database is based on PostgreSQL 8.3.23, this guide assumes some familiarity with PostgreSQL. References to are provided throughout this guide for features that are similar to those in Greenplum Database.
This information is intended for system administrators responsible for administering a Greenplum Database system.
Greenplum Database Ports and Protocols
Lists network ports and protocols used within the Greenplum cluster.
Describes how to restrict authorization access to database data at the user level by using roles and permissions.Encrypting Data and Database Connections
Describes how to encrypt data at rest in the database, or in transit over the network, to protect from eavesdroppers or man-in-the-middle attacks.
Provides steps for configuring Greenplum Database to access external tables in a Hadoop cluster secured with Kerberos.
Parent topic: Greenplum Database Security Configuration Guide