To minimize database vulnerabilities and the possibility of unauthorized access, implement the security measures below in the initial stage of system building. Additionally, configure the database server so that it primarily operates the database system only.
Configure the operating system and network to prevent intrusion into or destruction of a database server, so that the system operates on a secure server.
Remove unnecessary features or services on the operating system
Enable only the necessary protocols
Implement the security features for services, protocols, and daemons considered to have a relatively low security level, such as file sharing and FTP
Always download and apply the latest patches in order to reflect the latest security measures.
Install only the necessary features in order to prevent unauthorized use of the system.
Additionally, delete or disable features and services that will not be used.
To prevent unauthorized use of the system, change the default port that is set during installation.
Point
Specify the port during setup of Fujitsu Enterprise Postgres. Refer to the Installation and Setup Guide for Server for details.
To prevent unauthorized use of the system using the communication features, implement access restrictions for communication features.
To prevent database destruction, implement the measures below:
Restrict users who are permitted to access database configuration files, and periodically review the permissions
Allow only administrators to access table or definition scripts
To prevent unauthorized use or operating errors for the database, restrict the distribution range of applications used to access the database only to devices used by users who are permitted access.
To prevent unauthorized intrusions into a system through a backdoor, such as by tampering with the program source code of an application, document the author of the program to be run and perform checking and testing so that the program will not be tampered with. Additionally, employ safe coding techniques so that issues with general coding vulnerabilities can be addressed.
In cases where it is clear that the system security settings will impact security, set reliable security settings in the initial setup stage, such as setting appropriate security parameters.