Greenplum Database Security Configuration Guide

    • Securing the Database
      Introduces Greenplum Database security topics.

    • Describes the available methods for authenticating Greenplum Database clients.
    • Auditing
      Describes Greenplum Database events that are logged and should be monitored to detect security threats.

    • Describes basic security best practices that you should follow to ensure the highest level of system security.