Greenplum Database Security Configuration Guide
- Securing the Database
Introduces Greenplum Database security topics.
Describes the available methods for authenticating Greenplum Database clients.- Auditing
Describes Greenplum Database events that are logged and should be monitored to detect security threats.
Describes basic security best practices that you should follow to ensure the highest level of system security.