Security best practices for JDBC applications
- Last Updated: January 25, 2024
- 1 minute read
- DataDirect Connectors
- JDBC
- Aha! 6.0
- Amazon Redshift 6.0
- Apache Cassandra 6.0
- Apache Hive 6.0
- Apache Spark SQL 6.0
- Atlassian Jira 6.0
- Autonomous REST Connector 6.0
- Cloudera Impala 5.1
- + 24
When developing and deploying an JDBC application, there are a number of security considerations to keep in mind. To help protect your data and environments, we recommend reviewing the topics in this section and employing the security best practices described within.