This chapter describes features pertaining to security in Neo4j.
To protect your data, first ensure your physical data security by following industry best practices with regards to server and network security. Ensure that your Neo4j deployment adheres to your company’s information security guidelines by setting up the appropriate authentication and authorization rules. We describe authentication and authorization in Neo4j in Section 7.1, “Authentication and authorization”.
Logs can be harvested for continuous analysis, or for specific investigations. Facilities are available for producing security event logs as well as query logs as described in Chapter 8, Monitoring.
Finally, a simple checklist for Neo4j security is provided in Section 7.2, “Security checklist”.