OR
Ask AI
Star us on Github
Join us on Slack
Start Now
YugabyteDB Aeon
Try our fully-managed cloud DBaaS for free.
No credit card required
Sign up
YugabyteDB
Try our open source distributed SQL database on your laptop.
Download
Products
YugabyteDB
The open source distributed SQL database
YugabyteDB Anywhere
Self-managed cloud DBaaS
YugabyteDB Aeon
Fully-managed cloud DBaaS
YugabyteDB Voyager
Database migration service
Tutorials
Integrations
API
SQL APIs
YSQL
YCQL
Clients
ysqlsh
ycqlsh
Management APIs
YugabyteDB Anywhere API
YugabyteDB Aeon API
FAQ
Releases
YugabyteDB
YugabyteDB Anywhere
YugabyteDB Aeon
YugabyteDB Voyager
YugabyteDB Clients
Tech Advisories
YugabyteDB
Secure
v2.23
Preview
Preview release - not for production
v2.23
Preview
Preview release - not for production
v2024.1
STS
Stable release with standard-term support
v2.20
LTS
Stable release with long-term support
v2.18
STS
Stable release with standard-term support
v2.14
LTS
Stable release with long-term support
Unsupported versions
Secure
Secure your deployment of YugabyteDB
Contribute
Report a doc issue
Suggest new content
Edit this page
Contributor guide
Security checklist
Consider these security measures when deploying your YugabyteDB cluster.
Enable authentication
Enable authentication for all clients connecting to YugabyteDB.
Authentication methods
Choose the appropriate authentication mechanism.
Role-based access control
Manage users and roles, grant privileges, implement row-level security (RLS), and column-level security.
Encryption in transit
Enable encryption in transit (using TLS) to secure and protect network communication.
Encryption at rest
Enable encryption at rest to secure and protect data on disk.
Column-level encryption
Encrypt data present in columns containing sensitive data using per-column encryption at the application layer in YugabyteDB (using symmetric and asymmetric encryption).
Audit logging
Configure YugabyteDB's session-level and object-level audit logging for security and compliance.
Vulnerability disclosure
Learn about Yugabyte vulnerability reporting.