A newer version of this documentation is available.

View Latest

Security Best Practices

Best practices should be observed at all times, in order to ensure the security of Couchbase Server itself, the media it uses for data-persistence, the internal and external networks on which it resides, and the applications that query it.

Securing Couchbase Server

Security must be enforced — in order to protect data from being stolen, eavesdropped upon, or corrupted — throughout the entire Couchbase Server-environment: this environment includes the internal memory, processing, and storage-facilities of individual server-nodes within a cluster; the network across which the nodes communicate with one another; and the network beyond the cluster-perimeter. Security procedures must be checked constantly; and should be upgraded with frequency.

Within the Cluster

On each node of the Couchbase Server-cluster, essential security measures include:

All are described in detail, in this section.

Beyond the Cluster

Security must be maintained: