Making sure your ScyllaDB cluster is secure
Blog post from ScyllaDB
Ensuring the security of ScyllaDB clusters is crucial to prevent unauthorized access and potential data breaches, as highlighted by recent hacker attacks targeting various NoSQL databases. Key vulnerabilities include open ports such as CQL/Thrift, inter-node communication, JMX, REST API, and Prometheus client ports, which can allow attackers to connect and manipulate data if not properly secured. To safeguard against these risks, it is essential to close these ports through firewall configurations, utilize VPNs, enable SSL encryption for communication, and enforce client authentication with strong passwords. Additionally, modifying the replication strategy for the system_auth keyspace and managing user permissions can further enhance security by ensuring authentication data remains accessible and minimizing the potential impact of compromised credentials.