Chapter 5

Access Control of Data

Access Control—Roles for Individuals and Applications

Access to the database of an application is usually done by permissions given to the users or applications. The most general form of access given is the username and password set. However, before access is given, it is important to determine what access should be given, what privileges will be granted, and the user’s need to know. These depend on the trust an organization places in their employees. Trust may require a background investigation and security clearance details to be obtained for the user. Access is given to people and applications with system accounts but only after proper forms are signed by responsible individuals.

Interestingly, access control ...

Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.