

This document outlines essential security best practices for Dremio environments, targeting administrators and developers. It covers infrastructure security, data security with RBAC, and audit logging. Key topics include TLS wire encryption methods, authentication options, and configurations for securing communications in a Dremio cluster. Follow these guidelines to enhance the security posture of your Dremio deployment and protect sensitive data effectively.