Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

When deploying DPOD in a distributed architecture we highly recommend restrict access to big data store components using network security components like firewall.

Encryption at Rest

Note

Encryption at rest is only available in the Non-Appliance installation mode.


You may leverage the operating system (Red Hat Enterprise Linux) capabilities for handling encryption of data at rest based on LUKS Disk Encryption.

The following links provide more information on that topic: