| ▲ | Philip-J-Fry 2 hours ago | ||||||||||||||||
Can you give an example of more than one layer of logical separation at the data layer? We all know that authentication should have multiple factors. But that's a different problem. Fundamentally at the point you're reading or writing data you're asking the question "does X has permission to read/write Y". I don't see what you're getting at. | |||||||||||||||||
| ▲ | staticassertion 2 hours ago | parent [-] | ||||||||||||||||
I don't know their use case enough to understand what would or would not be an appropriate mitigation. For example, with regards to financial data, you could have client side encryption on values where those keys are brokered separately. I can't exactly design their system for them, but they're describing a system in which every employee has direct database access and the database holds financial information. | |||||||||||||||||
| |||||||||||||||||