
Overview
Access Control
Exploit
Introduction
Background
Holistic Security
Allow authorized access to your data
Prevent unauthorized access
Defense in Depth - many layers
Hardened Shell - perimeter security
Crunchy Core - in database security ← This talk. . .
Confinement - reduce attack surface
Instrumented - monitoring and alerting
Joe Conway PGCon 2020 2/52
评论