SlideShare a Scribd company logo
WEBINAR:
Enterprise-class security with PostgreSQL
Ajit G.
Principal Solution Architect, Ashnik
Jayaraj S.
Solution Architect, EnterpriseDB
Nishchay K.
Database Consultant, Ashnik
Webinar Covers
• Understanding the criticality of the security aspect in database design and why
Postgres is today’s default choice.
• What security features does Postgres offer to help organizations achieve the
Enterprise level security for their databases?
• Demo: Data redaction and EDB* Wrap (How it secure the business data and logic
inside the database)
“The average cost of a security breach has increased to $2.71 million per organization across ASEAN,
with the time taken to identify and contain an attack rising to 287 days.”
-- Channel News Asia, 20th Aug 2020
Business Impact
• Financial Lost/ Revenue Lost.
• Brand Value / Reputation.
• Stock Prices.
• Consumer Trust.
• Customers Turn Over
Standards and Techniques
• ISO, PCI DSS, GDPR, PII (Personal
Identifiable Information, HIPAA, PHI)
• AI and Machine Learning based
technique using XDR
• Multi Cloud adoptions
• Zero Trust Authentication /Network
• Focus on IT Security
RDBMS Security Techniques
“AAA” Model
• Authentication
• Authorization
• Accounting
 Backup & Recovery
 Encryption
 Data Masking
 Tokenization
 Deleting and Ensure
7
Enterprise-class security
with PostgreSQL
I will be covering
• Security Model
• Security Features in PostgreSQL
• Security Features in EPAS
• Best Practices
• Demo
Security Model
• Secure access is a two step process:
 Authentication:
Ensures a user he/she claims to be
 Authorization:
Ensures an authenticated user has access to only the data for which he/she has
been granted the appropriate privileges
Authentication Methods
• Password: Store password in scram-sha-256 & md5
• Certificate: It use SSL client certificates to perform authentication.
• RADIUS: Use RADIUS server for authentication
• LDAP: It use LDAP as the password verification method
Level of Security in PostgreSQL
Security Features in PostgreSQL
• Row Level Security – Virtual Private Database
• SSL support
• Encryption
 Password Encryption
 Encryption For Specific Columns
 Data Partition Encryption
 Encrypting Data Across A Network
• Data Masking
• Audit
 pgAudit – Extension
Security Features in EPAS
• All Security features of PostgreSQL
• Password Policy
• Code Protection
• SQL Protect
• Encryption
 DBMS_CRYPTO
• Data Masking
 Data Redaction
• Audit
 EDB Audit
Password Profile
• Advanced Server allows a database superuser to create named profiles. Each profile
defines rules for password management that augment password and md5
authentication. The rules in a profile can:
 Count failed login attempts
 Lock an account due to excessive failed login attempts
 Mark a password for expiration
 Define a grace period after a password expiration
 Define rules for password complexity
 Define rules that limit password re-use
Code Protection
• The EDB*Wrap utility protects proprietary source code and programs (functions, stored
procedures, triggers, and packages) from unauthorized scrutiny.
• The EDB*Wrap program translates a file that contains SPL or PL/pgSQL source code (the
plaintext) into a file that contains the same code in a form that is nearly impossible to
read.
• Once you have the obfuscated form of the code, you can send that code to EPAS and it
will store those programs in obfuscated form.
• edbwrap does not validate SQL source code - if the plaintext form contains a syntax
error, edbwrap will not complain but EPAS will report an error and abort the entire file
when you try to execute the obfuscated form.
SQL Protect
• Guards against the various types of SQL injections.
 Unauthorized Relations
 Utility Commands
 SQL Tautology
 Unbounded DML Statements
Encryption
• DBMS_CRYPTO package provides functions and procedures that allow you to encrypt or
decrypt RAW, BLOB or CLOB data.
• DBMS_CRYPTO functions to generate cryptographically strong random values.
• ENCRYPT function or procedure uses a user-specified algorithm, key, and optional
initialization vector to encrypt RAW, BLOB or CLOB data.
• DECRYPT function or procedure decrypts data using a user-specified cipher algorithm,
key and optional initialization vector.
• HASH function uses a user-specified algorithm to return the hash value of
a RAW or CLOB value.
Data Masking
• Data Redaction limits sensitive data exposure by dynamically changing data as it is
displayed for certain users.
• Data redaction is implemented by defining a function for each field to which redaction is
to be applied. The function returns the value that should be displayed to the users
subject to the data redaction.
• For example, bank account numbers as XXXXXX1235
• Supports DBMS_REDACT package
Auditing
• Advanced Server allows database and security administrators, auditors, and operators
to track and analyze database activities using the EDB Audit Logging functionality.
• EDB Audit Logging generates audit log files, which contains all of the relevant
information.
 The audit logs can be configured to record information such as:
 When a role establishes a connection to an Advanced Server database
 What database objects a role creates, modifies, or deletes when connected to Advanced
Server
 When any failed authentication attempts occur
• Audit parameters specified in the configuration
files, postgresql.conf or postgresql.auto.conf, control the information included in the
audit logs.
• EDB Audit files/logs can be generate in CSV or XML format
Best Practices
• Avoid to use default values
 Change default port
 Use non-default name for superuser. Can be specified during initdb
 By default, each new database has connect privileges to public schema
o Revoke connect on my_db from public;
o Grant connect to my_db to my_app_user;
• Control who can connect from where
• Configure pg_hba.conf effectively
• Avoid to use 0.0.0.0/0
• Avoid “trust” authentication
• Allow DBAs to use their personal user_id (Ex. DBA Nishchay need to use user
“nishchay”)
• Application user should not have superuser privileges
Best Practices
• Password policy should be implemented
• Use connection timeout, logging of connection & disconnection with duration
• Use Grant & Revoke appropriately to control the access
• Sensitive data should be masked
• Apply patch on Time
THANK YOU FOR ATTENDING THE WEBINAR

More Related Content

What's hot (20)

PDF
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Antonios Chatzipavlis
 
PPTX
Advanced SQL Server Performance Tuning | IDERA
IDERA Software
 
PDF
Azure SQL Database
rockplace
 
PDF
Data Platform Overview
Hamid J. Fard
 
PDF
Cloud Native PostgreSQL - APJ
EDB
 
PDF
5 Postgres DBA Tips
EDB
 
PDF
Azure Cloud Dev Camp - Introduction
giventocode
 
PPTX
5 Ways to Make Your Postgres GDPR-Ready
EDB
 
PPTX
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
PDF
SQL Server 2019 Data Virtualization
Matthew W. Bowers
 
PDF
Azure - Data Platform
giventocode
 
PPTX
Webinar: Managing Postgres at Scale
EDB
 
PPTX
Azure data platform overview
Alessandro Melchiori
 
PDF
Transform Your DBMS to Drive Application Innovation
EDB
 
PPTX
SQL Database on Azure
Thurupathan Vijayakumar
 
PPTX
Introduction to Windows Azure Data Services
Robert Greiner
 
PPTX
Microsoft Azure Offerings and New Services
Mohamed Tawfik
 
PDF
SQL Server 2019 Big Data Cluster
Maximiliano Accotto
 
PDF
Keynote: The Postgres Ecosystem
EDB
 
PDF
DBaaS with EDB Postgres on AWS
EDB
 
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018
Antonios Chatzipavlis
 
Advanced SQL Server Performance Tuning | IDERA
IDERA Software
 
Azure SQL Database
rockplace
 
Data Platform Overview
Hamid J. Fard
 
Cloud Native PostgreSQL - APJ
EDB
 
5 Postgres DBA Tips
EDB
 
Azure Cloud Dev Camp - Introduction
giventocode
 
5 Ways to Make Your Postgres GDPR-Ready
EDB
 
Geek Sync | SQL Security Principals and Permissions 101
IDERA Software
 
SQL Server 2019 Data Virtualization
Matthew W. Bowers
 
Azure - Data Platform
giventocode
 
Webinar: Managing Postgres at Scale
EDB
 
Azure data platform overview
Alessandro Melchiori
 
Transform Your DBMS to Drive Application Innovation
EDB
 
SQL Database on Azure
Thurupathan Vijayakumar
 
Introduction to Windows Azure Data Services
Robert Greiner
 
Microsoft Azure Offerings and New Services
Mohamed Tawfik
 
SQL Server 2019 Big Data Cluster
Maximiliano Accotto
 
Keynote: The Postgres Ecosystem
EDB
 
DBaaS with EDB Postgres on AWS
EDB
 

Similar to Enterprise-class security with PostgreSQL - 1 (20)

PPTX
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
PDF
A to z for sql azure databases
Antonios Chatzipavlis
 
PDF
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
PDF
Azure SQL Database
nj-azure
 
PPTX
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
PDF
Presentation database security enhancements with oracle
xKinAnx
 
PPTX
Securing Your Enterprise Web Apps with MongoDB Enterprise
MongoDB
 
PDF
Best Practices in Security with PostgreSQL
EDB
 
PDF
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
 
PPTX
EDB Database Servers and Tools
Ashnikbiz
 
PDF
Presentation database security audit vault & database firewall
xKinAnx
 
PPTX
Best Practices in Security with PostgreSQL
EDB
 
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
PDF
KoprowskiT_SQLSat419_WADBforBeginners
Tobias Koprowski
 
PPTX
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
PPTX
SharePoint Security in an Insecure World - AUSPC 2012
Michael Noel
 
PPTX
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Michael Noel
 
PDF
Best Practices in Security with PostgreSQL
EDB
 
PPTX
cosmodb ppt.pptxfkhkfsgkhgfkfghkhsadaljlsfdfhkgjh
Central University of South Bihar
 
PPTX
What's new in SQL Server 2016
James Serra
 
AUSPC 2013 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
A to z for sql azure databases
Antonios Chatzipavlis
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Azure SQL Database
nj-azure
 
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
Presentation database security enhancements with oracle
xKinAnx
 
Securing Your Enterprise Web Apps with MongoDB Enterprise
MongoDB
 
Best Practices in Security with PostgreSQL
EDB
 
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
 
EDB Database Servers and Tools
Ashnikbiz
 
Presentation database security audit vault & database firewall
xKinAnx
 
Best Practices in Security with PostgreSQL
EDB
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
KoprowskiT_SQLSat419_WADBforBeginners
Tobias Koprowski
 
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
Michael Noel
 
SharePoint Security in an Insecure World - AUSPC 2012
Michael Noel
 
Security for SharePoint in an Insecure World - SharePoint Connections Amsterd...
Michael Noel
 
Best Practices in Security with PostgreSQL
EDB
 
cosmodb ppt.pptxfkhkfsgkhgfkfghkhsadaljlsfdfhkgjh
Central University of South Bihar
 
What's new in SQL Server 2016
James Serra
 
Ad

More from Ashnikbiz (20)

PPTX
CloudOps_tool.pptx
Ashnikbiz
 
PPTX
Webinar_CloudOps final.pptx
Ashnikbiz
 
PPTX
Autoscaling in Kubernetes (K8s)
Ashnikbiz
 
PPTX
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Ashnikbiz
 
PDF
Zero trust in a multi tenant environment
Ashnikbiz
 
PPTX
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Ashnikbiz
 
PPTX
Deploy, move and manage Postgres across cloud platforms
Ashnikbiz
 
PPTX
The Best Approach For Multi-cloud Infrastructure Provisioning-2
Ashnikbiz
 
PPTX
The Best Approach For Multi-cloud Infrastructure Provisioning
Ashnikbiz
 
PPTX
Which PostgreSQL is right for your multi cloud strategy? P2
Ashnikbiz
 
PPTX
Which PostgreSQL is right for your multi cloud strategy? P1
Ashnikbiz
 
PPTX
Reduce the complexities of managing Kubernetes clusters anywhere 2
Ashnikbiz
 
PPTX
Reduce the complexities of managing Kubernetes clusters anywhere
Ashnikbiz
 
PPTX
Enhance your multi-cloud application performance using Redis Enterprise P2
Ashnikbiz
 
PPTX
Enhance your multi-cloud application performance using Redis Enterprise P1
Ashnikbiz
 
PPTX
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
PPTX
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
PPTX
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
PDF
Build robust streaming data pipelines with MongoDB and Kafka P2
Ashnikbiz
 
PPTX
Build robust streaming data pipelines with MongoDB and Kafka
Ashnikbiz
 
CloudOps_tool.pptx
Ashnikbiz
 
Webinar_CloudOps final.pptx
Ashnikbiz
 
Autoscaling in Kubernetes (K8s)
Ashnikbiz
 
Why and how to use Kubernetes for scaling of your multi-tier (n-tier) appli...
Ashnikbiz
 
Zero trust in a multi tenant environment
Ashnikbiz
 
Deploy and automate ‘Secrets Management’ for a multi-cloud environment
Ashnikbiz
 
Deploy, move and manage Postgres across cloud platforms
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning-2
Ashnikbiz
 
The Best Approach For Multi-cloud Infrastructure Provisioning
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P2
Ashnikbiz
 
Which PostgreSQL is right for your multi cloud strategy? P1
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere 2
Ashnikbiz
 
Reduce the complexities of managing Kubernetes clusters anywhere
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P2
Ashnikbiz
 
Enhance your multi-cloud application performance using Redis Enterprise P1
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Gain multi-cloud versatility with software load balancing designed for cloud-...
Ashnikbiz
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka P2
Ashnikbiz
 
Build robust streaming data pipelines with MongoDB and Kafka
Ashnikbiz
 
Ad

Recently uploaded (20)

PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
PPTX
Digital Circuits, important subject in CS
contactparinay1
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
What’s my job again? Slides from Mark Simos talk at 2025 Tampa BSides
Mark Simos
 
Digital Circuits, important subject in CS
contactparinay1
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 

Enterprise-class security with PostgreSQL - 1

  • 2. Ajit G. Principal Solution Architect, Ashnik Jayaraj S. Solution Architect, EnterpriseDB Nishchay K. Database Consultant, Ashnik
  • 3. Webinar Covers • Understanding the criticality of the security aspect in database design and why Postgres is today’s default choice. • What security features does Postgres offer to help organizations achieve the Enterprise level security for their databases? • Demo: Data redaction and EDB* Wrap (How it secure the business data and logic inside the database)
  • 4. “The average cost of a security breach has increased to $2.71 million per organization across ASEAN, with the time taken to identify and contain an attack rising to 287 days.” -- Channel News Asia, 20th Aug 2020 Business Impact • Financial Lost/ Revenue Lost. • Brand Value / Reputation. • Stock Prices. • Consumer Trust. • Customers Turn Over
  • 5. Standards and Techniques • ISO, PCI DSS, GDPR, PII (Personal Identifiable Information, HIPAA, PHI) • AI and Machine Learning based technique using XDR • Multi Cloud adoptions • Zero Trust Authentication /Network • Focus on IT Security
  • 6. RDBMS Security Techniques “AAA” Model • Authentication • Authorization • Accounting  Backup & Recovery  Encryption  Data Masking  Tokenization  Deleting and Ensure
  • 8. I will be covering • Security Model • Security Features in PostgreSQL • Security Features in EPAS • Best Practices • Demo
  • 9. Security Model • Secure access is a two step process:  Authentication: Ensures a user he/she claims to be  Authorization: Ensures an authenticated user has access to only the data for which he/she has been granted the appropriate privileges
  • 10. Authentication Methods • Password: Store password in scram-sha-256 & md5 • Certificate: It use SSL client certificates to perform authentication. • RADIUS: Use RADIUS server for authentication • LDAP: It use LDAP as the password verification method
  • 11. Level of Security in PostgreSQL
  • 12. Security Features in PostgreSQL • Row Level Security – Virtual Private Database • SSL support • Encryption  Password Encryption  Encryption For Specific Columns  Data Partition Encryption  Encrypting Data Across A Network • Data Masking • Audit  pgAudit – Extension
  • 13. Security Features in EPAS • All Security features of PostgreSQL • Password Policy • Code Protection • SQL Protect • Encryption  DBMS_CRYPTO • Data Masking  Data Redaction • Audit  EDB Audit
  • 14. Password Profile • Advanced Server allows a database superuser to create named profiles. Each profile defines rules for password management that augment password and md5 authentication. The rules in a profile can:  Count failed login attempts  Lock an account due to excessive failed login attempts  Mark a password for expiration  Define a grace period after a password expiration  Define rules for password complexity  Define rules that limit password re-use
  • 15. Code Protection • The EDB*Wrap utility protects proprietary source code and programs (functions, stored procedures, triggers, and packages) from unauthorized scrutiny. • The EDB*Wrap program translates a file that contains SPL or PL/pgSQL source code (the plaintext) into a file that contains the same code in a form that is nearly impossible to read. • Once you have the obfuscated form of the code, you can send that code to EPAS and it will store those programs in obfuscated form. • edbwrap does not validate SQL source code - if the plaintext form contains a syntax error, edbwrap will not complain but EPAS will report an error and abort the entire file when you try to execute the obfuscated form.
  • 16. SQL Protect • Guards against the various types of SQL injections.  Unauthorized Relations  Utility Commands  SQL Tautology  Unbounded DML Statements
  • 17. Encryption • DBMS_CRYPTO package provides functions and procedures that allow you to encrypt or decrypt RAW, BLOB or CLOB data. • DBMS_CRYPTO functions to generate cryptographically strong random values. • ENCRYPT function or procedure uses a user-specified algorithm, key, and optional initialization vector to encrypt RAW, BLOB or CLOB data. • DECRYPT function or procedure decrypts data using a user-specified cipher algorithm, key and optional initialization vector. • HASH function uses a user-specified algorithm to return the hash value of a RAW or CLOB value.
  • 18. Data Masking • Data Redaction limits sensitive data exposure by dynamically changing data as it is displayed for certain users. • Data redaction is implemented by defining a function for each field to which redaction is to be applied. The function returns the value that should be displayed to the users subject to the data redaction. • For example, bank account numbers as XXXXXX1235 • Supports DBMS_REDACT package
  • 19. Auditing • Advanced Server allows database and security administrators, auditors, and operators to track and analyze database activities using the EDB Audit Logging functionality. • EDB Audit Logging generates audit log files, which contains all of the relevant information.  The audit logs can be configured to record information such as:  When a role establishes a connection to an Advanced Server database  What database objects a role creates, modifies, or deletes when connected to Advanced Server  When any failed authentication attempts occur • Audit parameters specified in the configuration files, postgresql.conf or postgresql.auto.conf, control the information included in the audit logs. • EDB Audit files/logs can be generate in CSV or XML format
  • 20. Best Practices • Avoid to use default values  Change default port  Use non-default name for superuser. Can be specified during initdb  By default, each new database has connect privileges to public schema o Revoke connect on my_db from public; o Grant connect to my_db to my_app_user; • Control who can connect from where • Configure pg_hba.conf effectively • Avoid to use 0.0.0.0/0 • Avoid “trust” authentication • Allow DBAs to use their personal user_id (Ex. DBA Nishchay need to use user “nishchay”) • Application user should not have superuser privileges
  • 21. Best Practices • Password policy should be implemented • Use connection timeout, logging of connection & disconnection with duration • Use Grant & Revoke appropriately to control the access • Sensitive data should be masked • Apply patch on Time
  • 22. THANK YOU FOR ATTENDING THE WEBINAR