{"id":1698,"date":"2014-12-16T19:19:03","date_gmt":"2014-12-16T19:19:02","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=1698"},"modified":"2023-11-28T11:22:23","modified_gmt":"2023-11-28T19:22:23","slug":"memcached-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/memcached-security-best-practices\/","title":{"rendered":"Pr\u00e1ticas recomendadas de seguran\u00e7a do Memcached"},"content":{"rendered":"<p><a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">Memcached<\/a> A seguran\u00e7a \u00e9 um t\u00f3pico importante desde que os caras da sensepost lan\u00e7aram o go-derper na blackhat.<\/p>\n<p>A apresenta\u00e7\u00e3o foi muito boa e informativa, mas parece que o entusiasmo em torno dela deixou muitas pessoas confusas. Embora grande parte do assunto tenha sido abordado na apresenta\u00e7\u00e3o, ele precisa ser reafirmado o m\u00e1ximo poss\u00edvel.<\/p>\n<h3>Primeiro e sempre, o firewall<\/h3>\n<p>Isso realmente faz parte do teste de coloca\u00e7\u00e3o de administrador de sistemas e n\u00e3o tem nada a ver com <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> em particular, mas vou mencion\u00e1-lo mesmo assim.<\/p>\n<p>Voc\u00ea sempre come\u00e7a com um firewall <em>tudo<\/em> e, em seguida, permitir que apenas as coisas que voc\u00ea precisa passem para os locais onde voc\u00ea precisa que elas passem.<\/p>\n<p>N\u00e3o vou ensin\u00e1-lo a usar seu firewall, mas comece com a configura\u00e7\u00e3o que desativa toda a conectividade com sua caixa.<\/p>\n<p>Se estiver executando um servidor da Web, permita conex\u00f5es \u00e0 porta <code>443<\/code>. Se voc\u00ea tamb\u00e9m quiser conex\u00f5es n\u00e3o SSL, permita a porta <code>80<\/code>. Se esse \u00e9 o \u00fanico servi\u00e7o que voc\u00ea est\u00e1 fornecendo, ent\u00e3o seu firewall est\u00e1 completo!<\/p>\n<p>Gostaria de observar que <a href=\"https:\/\/aws.amazon.com\/ec2\/\"><u><span style=\"color: #0066cc\">Amazon EC2<\/span><\/u><\/a> faz isso <em>por padr\u00e3o<\/em>No entanto, h\u00e1 um n\u00famero suficiente de firewalls mal configurados que eles sentiram a necessidade de enviar um formul\u00e1rio de e-mail a muitos de seus usu\u00e1rios para inform\u00e1-los de que eles \"t\u00eam pelo menos um grupo de seguran\u00e7a que permite que toda a Internet tenha acesso \u00e0 porta mais comumente usada por <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> (11211)\".<\/p>\n<h3>Verifique suas fixa\u00e7\u00f5es<\/h3>\n<p>Se o seu aplicativo for executado em apenas um servidor (com o aplicativo e o <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> na mesma caixa), voc\u00ea pode vincul\u00e1-lo ao localhost adicionando<\/p>\n<div class=\"geshifilter\">\n<div class=\"text geshifilter-text\" style=\"font-family: monospace\">-l 127.0.0.1<\/div>\n<\/div>\n<p>para o <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> bandeiras. Agora, mesmo que voc\u00ea tenha bloqueado o acesso a <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a>, voc\u00ea precisa ser <em>em<\/em> a m\u00e1quina at\u00e9 mesmo para entrar em contato com o cache quando algu\u00e9m violar as configura\u00e7\u00f5es do firewall.<\/p>\n<h3>Se voc\u00ea precisar, use SASL<\/h3>\n<p>As vers\u00f5es mais recentes do <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> suporte \u00e0 criptografia <a href=\"https:\/\/en.wikipedia.org\/wiki\/Simple_Authentication_and_Security_Layer\"><u><span style=\"color: #0066cc\">SASL<\/span><\/u><\/a> autentica\u00e7\u00e3o.<\/p>\n<p>Embora voc\u00ea j\u00e1 tenha instalado um firewall em seu <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> desativados, voc\u00ea pode exigir que os clientes executem uma autentica\u00e7\u00e3o forte antes de usar o servi\u00e7o.<\/p>\n<h3>Por favor, <em>Por favor<\/em> N\u00e3o executar como raiz<\/h3>\n<p><span style=\"font-weight: 400\">Em nenhuma circunst\u00e2ncia voc\u00ea deve tentar executar <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> como raiz; ele <em>n\u00e3o<\/em>\u00a0<\/span>deseja executar como root. Ele se esfor\u00e7a muito para evitar isso. No entanto, muitas pessoas t\u00eam uma \"solu\u00e7\u00e3o alternativa\" que permite<a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\"> memcached <\/a>para iniciar como root (que n\u00e3o vou repetir) apenas para tornar sua infraestrutura menos segura.<\/p>\n<p>Se algu\u00e9m, de alguma forma, contornar o firewall que voc\u00ea configurou para impedir o acesso a <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> e, de alguma forma, consegue encontrar uma falha de seguran\u00e7a no <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/scaling-memcached-vbuckets\/\">memcached<\/a> permitindo a execu\u00e7\u00e3o de c\u00f3digo, voc\u00ea <em>realmente<\/em> quer simplesmente entregar o acesso root?<\/p>\n<p>N\u00e3o h\u00e1 problemas conhecidos, mas n\u00e3o auditamos o c\u00f3digo para garantir que seja seguro execut\u00e1-lo como root. Mas tudo bem, porque nenhum administrador de sistemas respons\u00e1vel jamais executaria um servi\u00e7o como root sem uma justificativa muito forte e, provavelmente, com muito trabalho para criar um ambiente de jailed.<\/p>\n<h3>Verifique suas configura\u00e7\u00f5es de firewall<\/h3>\n<p>N\u00e3o estou duvidando que voc\u00ea saiba como configurar seu firewall, mas tenha paci\u00eancia comigo.<\/p>\n<div><a href=\"https:\/\/nerduo.com\/thebattle\/\"><img decoding=\"async\" class=\"floatleft\" title=\"Conhecer \u00e9 metade da batalha\" src=\"https:\/\/dustin.github.com\/images\/thebattle.png\" alt=\"Knowing\" \/><\/a><\/div>\n<p>Agarrar <a href=\"https:\/\/nmap.org\/\"><u><span style=\"color: #0066cc\">nmap<\/span><\/u><\/a> ou similar. Execute uma varredura de porta completa em sua caixa - uma de um sistema confi\u00e1vel, uma de um sistema semiconfi\u00e1vel e uma de um sistema completamente n\u00e3o confi\u00e1vel.<\/p>\n<p>Se houver alguma resposta para algum servi\u00e7o que n\u00e3o possa justificar a execu\u00e7\u00e3o, agora voc\u00ea sabe disso e pode corrigi-lo.<\/p>\n<p>Isso \u00e9 <a style=\"color: #0066cc\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/memcached-replacement\/\">n\u00e3o apenas o memcached<\/a> - Isso \u00e9 gearman, beanstalkd, snmpd, um servidor de correio eletr\u00f4nico, um servidor DNS, um servidor LDAP, etc.<\/p>\n<p>Para qualquer servi\u00e7o que voc\u00ea <em>fazer<\/em> estejam em execu\u00e7\u00e3o e dispon\u00edveis publicamente, certifique-se de que voc\u00ea <em>completamente<\/em> compreender as implica\u00e7\u00f5es de seguran\u00e7a da execu\u00e7\u00e3o desse servi\u00e7o.<\/p>\n<p>N\u00e3o tenha vergonha de perguntar se n\u00e3o estiver entendendo tudo. \u00c9 muito melhor do que ser um exemplo em uma apresenta\u00e7\u00e3o no pr\u00f3ximo black hat porque voc\u00ea est\u00e1 executando um servi\u00e7o que n\u00e3o pretendia e vazou informa\u00e7\u00f5es importantes.<\/p>","protected":false},"excerpt":{"rendered":"<p>Memcached security is a hot topic since the sensepost guys released go-derper\u00a0at blackhat. The presentation was pretty good and informative, but it seems like the hype around it has left a bunch of people confused. Although much of this was [&hellip;]<\/p>","protected":false},"author":34,"featured_media":13873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"ppma_author":[8992],"class_list":["post-1698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Memcached Security Best Practices: 5 to Keep an Eye On<\/title>\n<meta name=\"description\" content=\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/memcached-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Memcached Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/memcached-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-16T19:19:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T19:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dustin.github.com\/images\/thebattle.png\" \/>\n<meta name=\"author\" content=\"Dustin Sallings, Chief Architect, Couchbase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dustin Sallings, Chief Architect, Couchbase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"},\"author\":{\"name\":\"Dustin Sallings, Chief Architect, Couchbase\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0\"},\"headline\":\"Memcached Security Best Practices\",\"datePublished\":\"2014-12-16T19:19:02+00:00\",\"dateModified\":\"2023-11-28T19:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"},\"wordCount\":637,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\",\"name\":\"Memcached Security Best Practices: 5 to Keep an Eye On\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"datePublished\":\"2014-12-16T19:19:02+00:00\",\"dateModified\":\"2023-11-28T19:22:23+00:00\",\"description\":\"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png\",\"width\":1800,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Memcached Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0\",\"name\":\"Dustin Sallings, Chief Architect, Couchbase\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/c5bddc8d7dab8b5c9121282556b0dbff\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g\",\"caption\":\"Dustin Sallings, Chief Architect, Couchbase\"},\"description\":\"Dustin Sallings is a Chief Architect at Couchbase. Dustin is an Author of spymemcached and core contributor to Couchbase and Memcached projects.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/dustin-sallings\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Memcached Security Best Practices: 5 to Keep an Eye On","description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/memcached-security-best-practices\/","og_locale":"pt_BR","og_type":"article","og_title":"Memcached Security Best Practices","og_description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/memcached-security-best-practices\/","og_site_name":"The Couchbase Blog","article_published_time":"2014-12-16T19:19:02+00:00","article_modified_time":"2023-11-28T19:22:23+00:00","og_image":[{"url":"https:\/\/dustin.github.com\/images\/thebattle.png","type":"","width":"","height":""}],"author":"Dustin Sallings, Chief Architect, Couchbase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dustin Sallings, Chief Architect, Couchbase","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"},"author":{"name":"Dustin Sallings, Chief Architect, Couchbase","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0"},"headline":"Memcached Security Best Practices","datePublished":"2014-12-16T19:19:02+00:00","dateModified":"2023-11-28T19:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"},"wordCount":637,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","articleSection":["Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/","url":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/","name":"Memcached Security Best Practices: 5 to Keep an Eye On","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","datePublished":"2014-12-16T19:19:02+00:00","dateModified":"2023-11-28T19:22:23+00:00","description":"This Couchbase blog includes 5 best practices in Memcached Security, including firewall tips, binding checks, SASL usage, and whether to Run as Root.","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2022\/11\/couchbase-nosql-dbaas.png","width":1800,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/memcached-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Memcached Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/e68b6f4489072ef4a84f60bc437c07d0","name":"Dustin Sallings, arquiteto-chefe da Couchbase","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/c5bddc8d7dab8b5c9121282556b0dbff","url":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","caption":"Dustin Sallings, Chief Architect, Couchbase"},"description":"Dustin Sallings is a Chief Architect at Couchbase. Dustin is an Author of spymemcached and core contributor to Couchbase and Memcached projects.","url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/dustin-sallings\/"}]}},"authors":[{"term_id":8992,"user_id":34,"is_guest":0,"slug":"dustin-sallings","display_name":"Dustin Sallings, Chief Architect, Couchbase","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/61704e29c6b19851f45c023b2f456b2a0c80ba03ae65e957e39080a0d15065e5?s=96&d=mm&r=g","first_name":"Dustin","last_name":"Sallings","user_url":"","author_category":"","description":"Dustin Sallings \u00e9 arquiteto-chefe da Couchbase. Dustin \u00e9 autor do spymemcached e um dos principais colaboradores do Couchbase e do <a href=\"https:\/\/developer.couchbase.com\/documentation\/server\/3.x\/developer\/dev-guide-3.0\/memcached.html#projects\">Projetos do Memcached.<\/a>"}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/1698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=1698"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/1698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/13873"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=1698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=1698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=1698"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=1698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}