Securing RethinkDB
In this section, we will look at some basic security mechanisms that can help secure the database.
Earlier in the book, I mentioned that RethinkDB was being actively developed and that there maybe features that have been added since the publication of this book. This is especially true for security mechanisms in RethinkDB. Although, there are already some basic security options available while I'm writing these lines, more features are being discussed.
Securing your RethinkDB cluster is extremely important as the default options allow queries to be executed by anyone. If your database instance is on a public network, anyone can access the web interface and driver ports. Thus, anyone can practically create tables, delete documents, and change database settings.
The very best thing that you can do to secure your database is to run it on a private network that doesn't allow access from the outside world. However, this may not always be feasible, especially if you're working...