Logging for Detection and Response: How We Build Security Signals at Cockroach Labs

Modern applications rely on CockroachDB for workloads where resilience, correctness and availability are absolutely critical. Whether it’s being deployed for payment systems, identity provider systems, or transactional systems, one thing is certain: If the underlying database platform of these applications isn’t secure, nothing built on top of it can be truly secure, either.

This article first appeared on Read More