CL: encrypt hsm_secret before backup to make sure it is not running again
See original GitHub issueTo guarantee that the CL node is not started accidentally after backup the hsm_secret should be encrypted and locked
Issue Analytics
- State:
- Created 2 years ago
- Comments:7 (3 by maintainers)
Top Results From Across the Web
About encrypted backups on your iPhone, iPad, or iPod touch
Your backup isn't encrypted by default. To encrypt a backup in the Finder or iTunes for the first time, turn on the password-protected ......
Read more >Transparent data encryption (TDE) - SQL Server
Learn about transparent data encryption, which encrypts SQL Server, Azure SQL Database, and Azure Synapse Analytics data, ...
Read more >Chapter 6 -- Information Security, from Safeguarding Your ...
Consider using backup software that includes an encryption option when backing up sensitive information: Encryption provides additional security that is well ...
Read more >Apple launches a big update that makes your iPhone backups ...
Advanced Data Protection for iCloud is an end-to-end encryption setting that offers Apple's highest level of cloud data security.
Read more >Chapter 6, Working with Encrypted InnoDB Tables
For MySQL 5.7.11 and earlier, backup for InnoDB tablespaces encrypted with “MySQL Enterprise Transparent Data Encryption (TDE)” is not supported by mysqlbackup ......
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found

Ok, tested succesfully and closing.
Found a non-showstopper issue, to be fixed later: #2979
will run those two more tests, but not expecting new issues