Du er ikke logget ind
Beskrivelse
¿Part I. Background1. What is Access Control?2. Data Types Requiring Access Control3. Data Privacy Laws and Regulatory Drivers4. Permission types
Part II. Creating Roles5. Functional Roles - What A Person Does6. Team Roles - Who A Person Is7. Assuming A Primary Role8. Secondary Roles
Part III. Granting Permissions to Roles9. Role Inheritance10. Account and Database Level Privileges 11. Schema-Level Privileges12. Table and View Level Privileges13. Row-Level Permissioning and Fine-Grained Access Control14. Column-Level Permissioning and Data Masking
Part IV. Operationally Managing Access Control15. Secure Data Sharing16. Separating Production from Development17. Upstream & Downstream Services18. Managing Access Requests