On 11/18/2015 11:45 AM, Day, David wrote:
Hi,

One of my co-workers came out of a NIST cyber-security type meeting
today and asked me to delve into postgres and zeroization.

I am casually aware of mvcc issues and vacuuming

I believe the   concern,  based on my current understanding  of postgres
inner workings,  is  that when a dead tuple is reclaimed by vacuuming:
  Is that reclaimed space initialized in some fashion that would  shred
any sensitive data that was formerly there to any  inspection by  the
subsequent owner of  that disk page ? ( zeroization )

Got to thinking, are you talking about a physical machine or a VM/container on shared hosting? If the latter then it is a more generic problem of detritus left behind between creations of virtual instances or cross talk on shared storage.


Not sure that is the exact question to ask but hopefully you get a feel
for the requirement is  not to  leave any sensitive data laying about for

recovery by a hacker,  or at least minimize the places it could be
obtained without actually being able to log into postgres or having raw
disk access privileges.

Thanks for any comments/instruction/links on the matter.

Regards

Dave Day



--
Adrian Klaver
adrian.kla...@aklaver.com


--
Sent via pgsql-general mailing list (pgsql-general@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-general

Reply via email to