17. User Management and Security
This module covers secure access design and operational controls to reduce data and credential risk.
Lessons
- Users, Roles, and Privileges — create users, assign roles, manage granular privileges
- Security Hardening — TLS, password policies, network restrictions, audit logging
Access Design Table
| Principle | Implementation |
|---|---|
| Least privilege | Grant only required permissions |
| Separation of duties | Different users/roles for app, admin, reporting |
| Credential hygiene | Rotation, strong auth plugin, policy checks |
| Network security | Restrict bind-address, firewall rules, TLS |
What's Next
- Continue to 18. Performance Optimization