Cluster Security

Teradata® Vantage User Guide

brand
Teradata Vantage
prodname
Teradata Vantage
vrm_release
1.0
category
User Guide
featnum
B700-4002-098K
Securing your clusters is important to help prevent unauthorized access.
Security Type Description
Port scanning Before port scanning, you must quiesce your system. Failure to do so could result in one or more of the following:
  • Bringing down the cluster
  • Data corruption
  • Hung queries
  • Core dump
Scan testing Tests ports open outside of the hardware cluster for simple vulnerability. Teradata has standardized on Nessus Security Scan. Nessus scans are performed monthly to expose vulnerabilities due to web applications and third party software packages included in the Teradata Software toolchain.
Penetration (Pen) testing Deeper vulnerability analysis than scan testing.

The main objective of penetration testing is to determine security weaknesses. A penetration test can also be used to test organization security policy compliance, employee security awareness, and organization ability to identify and respond to security incidents. The process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or real), and reporting the findings.

Teradata SQL Engine and Teradata ML Engine have been individually penetration tested and critical vulnerabilities have been fixed. The entire Teradata Vantage undergoes this testing regularly. For the latest test results, contact your Teradata Representative.

Data encryption Teradata SQL Engine provides encryption for:
  • Passwords
  • Messages
  • Full disk data
  • Backup, archive, and restore operations

For more information, see Teradata® Database Security Administration, B035-1100.