Chapter 7. Security Techniques (Guard Your Data)

Redis was designed to be used in a trusted private network. It supports a very basic security system to protect the connection between the client and server via a plain-text password.

It is important to protect the Redis instances. An attack on an unprotected instance could put your data into unauthorized hands. Also, the command FLUSHALL can be used by an external attacker, which could cause you to lose all of your data.

We will explain some techniques of using the existing security mechanisms in Redis as well as other approaches to improving security around Redis.

The basic security

When Redis was designed, the main goals were maximum performance and simplicity, rather than maximum security. Although ...

Get Redis Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.