Security Vulnerabilities
This topic describes the key security technologies for TIBCO® Graph Database software. In addition to these key technologies, security also depends in part upon correct configuration and uses of its component and capabilities.
OpenSSL
Security features that protect TIBCO® Graph Database connections and communications, Encrypting/Decrypting data depend on the implementation of OpenSSL. If the security of OpenSSL were compromised, TIBCO® Graph Database and applications that use the database could be vulnerable as well.
Python
TIBCO® Graph Database supports Stored Procedures written in Python. It can use python libraries and third-party libraries as per application needs. This code needs to go through proper review procedures to ensure of handling sensitive data, external communications, and other security vulnerabilities; just like one would review an application written for Graph Database. TIBCO® Graph Database ships white-listed Python libraries, and it depends on its security.
Operating System
TIBCO® Graph Database runs on top of an Operating System and depends on its security. If the security of the OS is compromised, TIBCO® Graph Database and applications that use the database could be vulnerable as well.
Storage System
TIBCO® Graph Database uses storage provided by Operating System or a Storage Area Network or Network File System and depends on its security. If the security of the Storage system is compromised, TIBCO® Graph Database and applications that use the database could be vulnerable as well.