Crunchy Data, the leading provider of trusted open source Postgres technology and support, in collaboration with the Center for Internet Security, is proud to announce the publication of the PostgreSQL CIS Benchmark™ for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems Agency (DISA) to make PostgreSQL the first open source database to provide a published STIG in 2017 and this update reflects their ongoing partnership to provide enhanced security guidance as PostgreSQL continues to advance and evolve.
The PostgreSQL CIS Benchmark series provides security-focused enterprises with a thorough manual on configuring and utilizing open source PostgreSQL. As organizations consider open source PostgreSQL as a substitute for proprietary database systems, they can consult the CIS Benchmark for guidance.
PostgreSQL version 16 was recently released by the PostgreSQL Global Development group and includes notable improvements:
- Performance: Each version of PostgreSQL is packed with performance improvements and this one is no different. There’s new things built into the query planning, CPU accelerations, faster COPY statement, and improvements in ASCII and JSON strings to name a few.
- JSON: JSON support in Postgres gets better every year. Version 16 adds more syntax from the SQL / JSON standard, including JSON_ARRAY(), JSON_ARRAYARG(), and IS JSON.
- Logical replication: Logical replication got a few major improvements. You can now create a logical replica from a standby. This allows new changes to reduce workload on the primary server and expands options for high availability and active-active systems.
- Monitoring i/o: Postgres 16 introduces a new stat view called pg_stat_io to show i/o metrics and i/o access patterns.
The latest CIS Benchmark for Postgres 16 is available for download on the CIS website. Crafting a CIS Benchmark involves extensive collaboration, with substantial peer reviews and discussions taking place before the release of a major version. This process ensures a consensus on the optimal practices for establishing a secure system.
SOURCE: PRNewswire