Member-only story

Postgres Security 101: Installation and Patching Checklist (1/8)

Oz

This article is the first part of an eight-part series on PostgreSQL security. In this series, we’ll explore various aspects of securing a PostgreSQL database. We begin with the foundation: installation and patching. A secure installation process sets the stage for a protected database environment, and keeping your system up to date with patches is key to maintaining that security over time. This checklist will guide you through best practices to follow during the installation and patching of PostgreSQL to ensure your system is as secure as possible from day one.

1.1 Ensure Packages Are Obtained from Authorized Repositories

  • 1.1.1 PostgreSQL Packages Installed (Manual): Ensure PostgreSQL packages are installed correctly.
# Check Installed PostgreSQL Packages for On Red Hat Based Systems
rpm -qa | grep postgresql

# You can check your rpm your outputs
postgresql13-libs-13.13-1PGDG.rhel9.x86_64
postgresql13-13.13-1PGDG.rhel9.x86_64
postgresql13-server-13.13-1PGDG.rhel9.x86_64
postgresql13-contrib-13.13-1PGDG.rhel9.x86_64
postgresql13-devel-13.13-1PGDG.rhel9.x86_64

/*
This command lists all RPM packages with "postgresql" in their names.
You should see entries like above this;
postgresql-server
postgresql-libs
and postgresql-contrib.
*/

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Oz
Oz

Written by Oz

Database Administrator 🐘

No responses yet

Write a response