CHARLESTON, S.C., July 1, 2019 /PRNewswire/ — Crunchy Data, the leading provider of trusted open source PostgreSQL technology and support, in collaboration with the Center for Internet Security®, is pleased to announce the publication of a PostgreSQL CIS Benchmark™ for PostgreSQL 11. Crunchy Data again collaborated with CIS® by evaluating open source PostgreSQL 11 against CIS’s security requirements and developed the guide defining how open source PostgreSQL can be configured and deployed to meet security requirements for enterprise systems.
The PostgreSQL CIS Benchmark offers security-conscious enterprises a comprehensive guide for open source PostgreSQL configuration and usage. Enterprises can refer to the CIS Benchmark as they consider open source PostgreSQL as an alternative to proprietary and other database systems. The PostgreSQL CIS Benchmark can be downloaded from https://www.cisecurity.org/cis-benchmarks/.
This newly published CIS PostgreSQL 11 Benchmark joins the existing CIS Benchmarks for PostgreSQL 9.5, 9.6, and 10 while continuing to build upon Crunchy Data’s efforts with the PostgreSQL Security Technical Implementation Guide (PostgreSQL STIG).
“Organizations need access to the best guidance available for the secure configuration and operation of the PostgreSQL database. It’s our mission to provide security best practices and certifications to help drive further adoption of the world’s most advanced open source relational database,” said President of Crunchy Data, Paul Laurence.
PostgreSQL is a powerful, open source, object-relational database system with more than 20 years of active development and a strong global development community. Commercial enterprises and government agencies with a focus on advanced data management benefit from PostgreSQL’s proven architecture and reputation for reliability, data integrity, and cost effectiveness.
Crunchy Certified PostgreSQL, Crunchy Data’s trusted 100% open source PostgreSQL distribution, eases this new CIS Benchmark’s compliance by providing the requisite security enhancing audit logging extensions for deploying PostgreSQL, along with secure disaster recovery capabilities. Crunchy Certified PostgreSQL also includes popular extensions such as PostGIS, a robust geospatial database for PostgreSQL. Crunchy Certified PostgreSQL has received Common Criteria Evaluation Assurance Level (EAL) 2+ certification, an international standard for computer security certification. It is the first commercially available open source relational database management system to receive Common Criteria certification.
About Crunchy Data
Crunchy Data is the leading provider of trusted open source PostgreSQL technology, support, and training for enterprises. Crunchy Data offers Crunchy Certified PostgreSQL, the most advanced true open source RDBMS on the market. Crunchy Data is a leading provider of cloud native PostgreSQL – providing open source, cloud-agnostic PostgreSQL-as-a-Service solutions. PostgreSQL’s active development community, proven architecture, and reputation for reliability, data integrity, and ease of use makes it a prime candidate for enterprises looking for a robust relational database alternative to expensive proprietary database technologies. Learn more at www.crunchydata.com
About Center for Internet Security
Center for Internet Security (CIS) is a forward-thinking nonprofit entity that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and CIS Benchmarks are global standards and recognized best practices for securing IT systems and data against the most pervasive attacks.
These proven guidelines are continuously refined and verified by a volunteer global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing & Analysis Center®(MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial governments. To learn more, visit CISecurity.org
About DISA Security Technical Implementation Guidelines
A Security Technical Implementation Guideline (STIG) is used as the configuration standard for the Department of Defense Information Assurance (IA) and IA-enabled devices/systems. Since 1998, DISA has played a critical role enhancing the security posture of the Department of Defense’s security systems by providing the STIGs. The STIGs contain technical guidance to “lock down” information systems/software that might otherwise be vulnerable to a malicious computer attack. Learn more at https://iase.disa.mil/stigs/Pages/index.aspx
Center for Internet Security, CIS, and CIS Benchmark are registered trademarks of the Center for Internet Security.
SOURCE Crunchy Data