Challenges With Managing Permissions Using Database Roles
Databases enable RBAC through the database roles which are used for administering user access to schemas, tables, and views. However, as organizations become more data-driven and often have hundreds of users and applications accessing data stored in databases, data warehouses, and data lakes, governing the security of sensitive datasets becomes increasingly unwieldy in practice.
This white paper describes the challenges of administering data security governance policies using database roles and provides an alternative approach that addresses those challenges.
This white paper explains:
- The database RBAC model
- Limitations of using database roles for Data Security Governance
- How Cyral provides an enforceable, easy-to-manage Data Security Contract