This chapter covers important security aspects in Neo4j.
Ensure your physical data security by following industry best practices with regard to server and network security.
This chapter includes the following:
Additionally, logs can be useful for continuous analysis, or for specific investigations. Facilities are available for producing security event logs as well as query logs as described in Chapter 12, Monitoring.
Refer to Chapter 10, Authentication and authorization for information on how to manage users and their authentication and authorization.