From the course: Secure Data Management for AI Implementation

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Reinforcing and enforcing application security

Reinforcing and enforcing application security - MySQL Tutorial

From the course: Secure Data Management for AI Implementation

Reinforcing and enforcing application security

- [Instructor] Protecting databases cascades to also securing applications. Bad actors see these applications as riddled with vulnerabilities. Each one makes achieving unauthorized access easier. For instance, security misconfigurations exploit default configurations, incomplete setups, or overly verbose error messages to gain unauthorized access. Since you know the goal is to manipulate data and/or code, you're working to counteract these attacks. It requires establishing and strengthening the foundation of application security through process, people, and technology. The process pillar covers the policies, procedures, and workflows used to manage applications through security requirements and threat modeling. Now, the people pillar focuses on managing human risk. You're most concerned about the actions and behaviors of your workforce on the company's systems. The technology pillar gets the most attention since it handles…

Contents