Linked e-resources
Details
Table of Contents
Part I. Background
1. What is Access Control?
2. Data Types Requiring Access Control
3. Data Privacy Laws and Regulatory Drivers
4. Permission types
Part II. Creating Roles
5. Functional Roles - What A Person Does
6. Team Roles - Who A Person Is
7. Assuming A Primary Role
8. Secondary Roles
Part III. Granting Permissions to Roles
9. Role Inheritance
10. Account and Database Level Privileges
11. Schema-Level Privileges
12. Table and View Level Privileges
13. Row-Level Permissioning and Fine-Grained Access Control
14. Column-Level Permissioning and Data Masking
Part IV. Operationally Managing Access Control
15. Secure Data Sharing
16. Separating Production from Development
17. Upstream & Downstream Services
18. Managing Access Requests.
1. What is Access Control?
2. Data Types Requiring Access Control
3. Data Privacy Laws and Regulatory Drivers
4. Permission types
Part II. Creating Roles
5. Functional Roles - What A Person Does
6. Team Roles - Who A Person Is
7. Assuming A Primary Role
8. Secondary Roles
Part III. Granting Permissions to Roles
9. Role Inheritance
10. Account and Database Level Privileges
11. Schema-Level Privileges
12. Table and View Level Privileges
13. Row-Level Permissioning and Fine-Grained Access Control
14. Column-Level Permissioning and Data Masking
Part IV. Operationally Managing Access Control
15. Secure Data Sharing
16. Separating Production from Development
17. Upstream & Downstream Services
18. Managing Access Requests.