From: | Jim Nasby <Jim(dot)Nasby(at)BlueTreble(dot)com> |
---|---|
To: | Melvin Davidson <melvin6925(at)gmail(dot)com>, oleg yusim <olegyusim(at)gmail(dot)com> |
Cc: | George Neuner <gneuner2(at)comcast(dot)net>, PostgreSQL General <pgsql-general(at)postgresql(dot)org> |
Subject: | Re: Shared system resources |
Date: | 2015-12-25 20:08:50 |
Message-ID: | 567DA252.4070108@BlueTreble.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-general |
On 12/23/15 12:05 PM, Melvin Davidson wrote:
> As others have pointed out, worrying about someone accessing database
> shared memory is like worrying about an asteroid striking the earth and
> wiping out all life.
> It's a one in a billion chance compared to other security violations
> that can occur.
> You are better off concentrating on proper O/S security and user/table
> permissions. That is how to implement database security!
True, but in my experience security audits have nothing to do with
security and everything to do with marking off checkboxes and
complicating lawsuits. ;)
--
Jim Nasby, Data Architect, Blue Treble Consulting, Austin TX
Experts in Analytics, Data Architecture and PostgreSQL
Data in Trouble? Get it in Treble! http://BlueTreble.com
From | Date | Subject | |
---|---|---|---|
Next Message | Kevin Waterson | 2015-12-26 07:28:26 | Recurring and non recurring events. |
Previous Message | Jim Nasby | 2015-12-25 19:58:32 | Re: efficient math vector operations on arrays |