- Database Service level access controls
Scalable Authentication: Database clusters consist of a large number of nodes, and the authentication models should be scalable to support such large network authentication
Impersonation: Database services should be able to impersonate the user submitting the job so that the correct user isolation can be maintained
Self-Served: Database jobs run for long time, so they should be able to ensure that the jobs are able to self-heal the delegated user authentication to complete the job
Secure Inter Process Communication: Database services should be able to authenticate each other and ensure secured communication between themselves - User level access controls
Users of Database should only be able to access data that is authorized for them
Only authenticated users should be able to submit jobs to the Database cluster
Users should be able to view, edit and kill only their own jobs
Tag: Database Security