Extending Zero Trust to the SQL Layer: How to Mitigate Data Risk by Controlling Data Consumption

Extending Zero Trust to the SQL Layer: How to Mitigate Data Risk by Controlling Data Consumption

ALTR
Published by: Research Desk Released: Oct 15, 2020

Today’s business users need fast, remote access to sensitive enterprise data simply to do their jobs. Yet this need also expands the attack surface for bad actors to exfiltrate data. What can security teams do to prevent breaches without hampering legitimate users?
By extending “zero trust” to the SQL layer organizations can now achieve powerful security and control at the epicenter of risk — the data itself. This transcends the limitations of traditional identity access management, which imposes controls over identity authentication and data access, but doesn’t provide control down to the individual query.