Transparent Data Encryption (TDE) and encrypted files
| От | Bruce Momjian |
|---|---|
| Тема | Transparent Data Encryption (TDE) and encrypted files |
| Дата | |
| Msg-id | 20190930212633.GA18178@momjian.us обсуждение |
| Ответы |
Re: Transparent Data Encryption (TDE) and encrypted files
Re: Transparent Data Encryption (TDE) and encrypted files Re: Transparent Data Encryption (TDE) and encrypted files Re: Transparent Data Encryption (TDE) and encrypted files |
| Список | pgsql-hackers |
For full-cluster Transparent Data Encryption (TDE), the current plan is
to encrypt all heap and index files, WAL, and all pgsql_tmp (work_mem
overflow). The plan is:
https://wiki.postgresql.org/wiki/Transparent_Data_Encryption#TODO_for_Full-Cluster_Encryption
We don't see much value to encrypting vm, fsm, pg_xact, pg_multixact, or
other files. Is that correct? Do any other PGDATA files contain user
data?
--
Bruce Momjian <bruce@momjian.us> http://momjian.us
EnterpriseDB http://enterprisedb.com
+ As you are, so once was I. As I am, so you will be. +
+ Ancient Roman grave inscription +
В списке pgsql-hackers по дате отправления: