Cybersecurity / Cohort
Database Security Controls Workshop
Encryption, auditing, masking, and least-privilege reviews for regulated workloads.
Overview
Security engineers and DBAs collaborate on threat modeling for relational stores. Scenarios include insider access, stolen credentials, and third-party analyst onboarding.
What is included
- Threat modeling canvas tuned to SQL engines
- Column masking lab with policy documentation
- Audit log parsing exercise with sample payloads
- Rotation drill for database credentials
- Third-party access review checklist
- Tabletop on data residency questions
- Legal/compliance office hour guest slot
Outcomes you can show
- Produce a least-privilege matrix for a sample fintech schema.
- Document a masking policy with rollback steps.
- Summarize audit findings in executive-friendly language.
Experience notes
“Masking lab documentation passed our internal review with only minor edits—Nam’s audit log drill was uncomfortably realistic.”
“The least-privilege matrix exercise surfaced role grants we had inherited from a 2019 migration—documentation template is now part of our audit pack.”
FAQ
Red team exercises?
We simulate misconfigurations ethically; no live offensive testing against production systems.
Compliance certification?
Content references ISO-style thinking but does not grant certifications.
What is excluded?
Application-layer OWASP topics are out of scope; this is database-centric.