Skip to content

Security Practices

There are two types of distinct and limited access in Aerospike Cloud:

  • Aerospike Cloud account members:

    • Can access management tools through the Cloud Console or public applications
    • Are limited to the Console and APIs inside the Aerospike Cloud organization.
    • Have broad powers to administer databases, create API keys for public API access, and manage Aerospike Cloud database users
  • Aerospike Database users:

    • Can access an Aerospike database running in the cloud using database credentials
    • May be granted specific roles that enable access to manipulate the database
    • Can not create other database users

Best Practices

Aerospike Cloud currently only supports VPC peering connectivity. The database and it’s endpoints will only be available through a VPC peering connection during preview.

Best practices for Aerospike Cloud account members

  • Limit access to your account to a small number of trusted administrators
  • Consider using multiple accounts to separate concerns in large organizations

Best practices for Aerospike Cloud database users

  • Scope roles to the minimal needed permission set using the principle of least privilege
  • Choose secure passwords
  • Periodically rotate passwords or users
  • Use VPC peering connections to your database

Connecting to your cluster with VPC peering

VPC peering connections in AWS are managed over a private network with encrypted traffic. With VPC peering the Aerospike Database cluster and associated node addresses and metrics endpoints are only available through a controlled connection. You can read about them in AWS’s VPC peering documentation.

Aerospike Cloud supports disabling TLS encryption between VPCs but this is not a recommended practice. See Configure AWS VPC peering for information about configuring a connection.

Feedback

Was this page helpful?

What type of feedback are you giving?

What would you like us to know?

+Capture screenshot

Can we reach out to you?