HiveBrain v1.2.0
Get Started
← Back to all entries
snippetsqlMinor

Postgres How to securely initialize the database?

Submitted by: @import:stackexchange-dba··
0
Viewed 0 times
thepostgresdatabasehowsecurelyinitialize

Problem

I'm initializing a Postgres DB and would like to know what is the best way to do it.

Objectives:

  • We would like to use default database (postgres) unless there's a strong reason not to do.



  • We would like to use default schema (public) unless there's a strong reason not to do.



  • We would like to apply the Principle of Least Privilege.



  • No one (apart from those created below) should be able to anything in the DB.



One thing I know, public is public, fix it:

REVOKE ALL ON DATABASE postgres FROM PUBLIC;
REVOKE ALL ON SCHEMA public FROM PUBLIC;
REVOKE ALL ON ALL TABLES IN SCHEMA public FROM PUBLIC;
REVOKE ALL ON ALL SEQUENCES IN SCHEMA public FROM PUBLIC;


  • Is it enough? Did I miss anything? Do I need to revoke anything else?



  • I read somewhere, creating some object automatically grants some privilege to PUBLIC (sorry for too many somes, I hardly remember the exact information). Should I be worried about this?



And then I create some roles and grants appropriate privileges:

```
-- Creating DB admin user to be used only by Flyway
CREATE USER db_admin WITH PASSWORD passwd CONNECTION LIMIT 5;
GRANT CONNECT ON DATABASE postgres TO db_admin;
GRANT ALL ON SCHEMA public TO db_admin;
GRANT ALL ON ALL TABLES IN SCHEMA public TO db_admin;
GRANT ALL ON ALL SEQUENCES IN SCHEMA public TO db_admin;

-- Creating DB application users with read/write permissions
CREATE ROLE db_writers;
GRANT CONNECT ON DATABASE postgres TO db_writers;
GRANT USAGE ON SCHEMA public TO db_writers;
GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA public TO db_writers;
GRANT USAGE, SELECT, UPDATE ON ALL SEQUENCES IN SCHEMA public TO db_writers;
GRANT USAGE, SELECT, UPDATE ON ALL SEQUENCES IN SCHEMA public TO db_writers;

-- Must run it as db_admin
ALTER DEFAULT PRIVILEGES FOR ROLE db_admin IN SCHEMA public GRANT SELECT, INSERT, UPDATE, DELETE ON TABLES TO db_writers;
ALTER DEFAULT PRIVILEGES FOR ROLE db_admin IN SCHEMA public GRANT USAGE, SELECT, UPDATE ON SEQUENCES T

Solution

Your SQL script looks good, except that you shouldn't use

CREATE USER ... PASSWORD '...';


to give a user a password. The problem is that the password goes across the line in clear text and might end up in the server log.

Either hash the password on the client side and send it that way, or use psql's \password command to change the password interactively.

You should not use the postgres database for user data. It is intended for administrative purposes only (a place to connect if you want to run CREATE DATABASE or DROP DATABASE).

You can use the public schema; the only problem I see is that if you create an extension, the extension's objects end up in the same schema as the application objects, which I believe is not nice. I prefer to create a schema for the application and leave public for extension owned objects.

I am not sure what you mean when you say that you cannot get it to work with db_admins. I assume that you want to have a group of administrators so that each of them can ALTER and DROP the objects the others created.

That is not possible, because only the object owner (and a superuser) can do that. If you want several administrative users, you could proceed as follows:

-
Only db_admins (a NOLOGIN role) can create objects in the schema.

-
The administrative users are created with NOINHERIT and belong to db_admins.

-
Whenever an administrative user wants to create or modify an object, he or she has to first run:

SET ROLE db_admins;


This is a bit cumbersome, but a solution similar to not allowing remote logins as root on UNIX and using su to become root instead.

Code Snippets

CREATE USER ... PASSWORD '...';
SET ROLE db_admins;

Context

StackExchange Database Administrators Q#242545, answer score: 2

Revisions (0)

No revisions yet.