This chapter covers important security aspects in Neo4j.
Ensure your physical data security by following industry best practices with regard to server and network security.
This chapter includes the following:
Additionally, logs can be useful for continuous analysis, or for specific investigations. Facilities are available for producing security event logs as well as query logs as described in Chapter 9, Monitoring.