1.1 - Cluster Security - Teradata Vantage

Teradata Vantageā„¢ User Guide

Teradata Vantage
May 2020
User Guide
Securing your clusters is important to help prevent unauthorized access.
Security Type Description
Port scanning Before port scanning, you must quiesce your system. Failure to do so could result in one or more of the following:
  • Bringing down the cluster
  • Data corruption
  • Hung queries
  • Core dump
Scan testing Tests ports open outside of the hardware cluster for simple vulnerability. Teradata has standardized on Nessus Security Scan. Nessus scans are performed monthly to expose vulnerabilities due to web applications and third party software packages included in the Teradata Software toolchain.
Penetration (Pen) testing Deeper vulnerability analysis than scan testing.

The main objective of penetration testing is to determine security weaknesses. A penetration test can also be used to test organization security policy compliance, employee security awareness, and organization ability to identify and respond to security incidents. The process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or real), and reporting the findings.

Advanced SQL Engine and ML Engine have been individually penetration tested and critical vulnerabilities have been fixed. The entire Teradata Vantage undergoes this testing regularly. For the latest test results, contact your Teradata Representative.

Data encryption Advanced SQL Engine provides encryption for:
  • Passwords
  • Messages
  • Full disk data
  • Backup, archive, and restore operations

See Teradata Vantageā„¢ - Advanced SQL Engine Security Administration, B035-1100.