Security Type | Description |
---|---|
Port scanning | Before port scanning, you must quiesce your system. Failure to do so could result in one or more of the following:
|
Scan testing | Tests ports open outside of the hardware cluster for simple vulnerability. Teradata has standardized on Nessus Security Scan. Nessus scans are performed monthly to expose vulnerabilities due to web applications and third party software packages included in the Teradata Software toolchain. |
Penetration (Pen) testing | Deeper vulnerability analysis than scan testing. The main objective of penetration testing is to determine security weaknesses. A penetration test can also be used to test organization security policy compliance, employee security awareness, and organization ability to identify and respond to security incidents. The process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or real), and reporting the findings. Teradata SQL Engine and Teradata ML Engine have been individually penetration tested and critical vulnerabilities have been fixed. The entire Teradata Vantage undergoes this testing regularly. For the latest test results, contact your Teradata Representative. |
Data encryption |
Teradata SQL Engine provides encryption for:
For more information, see Teradata® Database Security Administration, B035-1100. |
Securing your clusters is important to help prevent unauthorized access.