Professional Documents
Culture Documents
Implementing Database Security To Protect Your Data
Implementing Database Security To Protect Your Data
Implementing Database Security To Protect Your Data
Data
Posted in November 1st, 2007
by ckim in Security
1. Populate Audit Columns using database triggers - As a general rule, 4 Auditing columns
(who the row was created by, when the row was created, who modified it and when it was
modified)
AUDIT_REC_UPDT_DTS TIMESTAMP(6)
AUDIT_REC_UPDT_DB_USER_NM VARCHAR2(256)
AUDIT_REC_CREATE_DTS TIMESTAMP(6)
AUDIT_REC_CREATE_DB_USER_NM VARCHAR2(256)
These row auditing triggers should be thorougly tested in development, test and pre-
production database environments before it is implemented in production.