Articles in this section
Category / Section

Ensuring Data Security with Bold BI: Key Measures to Protect Sensitive Information

Published:

When considering the integration with Bold BI, particularly in industries that handle sensitive information, it is crucial to address security concerns regarding the storage of passwords and database connection information. Here are key points to reassure stakeholders about the safety and security of using Bold BI.

Security Features of Bold BI

  1. Firewall Protection: Bold BI database servers are secured behind a firewall, ensuring that they are not exposed to the internet. This is a fundamental security measure that protects sensitive data from unauthorized access.

  2. Reverse Proxy Implementation: Bold BI supports the configuration of a reverse proxy. This adds an additional layer of security by acting as an intermediary for requests from clients seeking resources from the server. More details on configuring a reverse proxy can be found here.

  3. Zero Trust Model: Bold BI can be deployed under a Zero Trust Model, which is a security concept that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter.

  4. Encrypted Database Connections: The database connection can be encrypted, ensuring that data in transit is secure and protected from interception.

More details on security can be found here.

Related Links

Was this article useful?
Like
Dislike
Help us improve this page
Please provide feedback or comments
PK
Written by Poovarasan Kandasamy
Updated
Comments (0)
Please  to leave a comment
Access denied
Access denied