Redis is designed to be accessed by trusted clients within trusted environments for maximum performance. It is not optimized for security but simplicity. Network access to Redis should be limited to trusted clients on the network. Redis listens to all interfaces by default but this can be configured. Redis provides a basic authentication layer where clients authenticate with a password set in the configuration file. Data encryption is not supported so additional layers may be needed over untrusted networks. Specific Redis commands can be disabled or renamed to limit clients. The Redis protocol prevents SQL injection as it uses binary-safe prefixed strings.