In the previous chapter, we saw how we can incorporate access management in an application to secure it from unauthorized access, which is essentially the application level security. However, what if we don't have our database secured? Well, in that case, data can be misused by unauthorized users or even authorized users, such as database administrators, which leads to business loss or sometimes legal actions.
Data security is always a major concern, especially when it is hosted on Cloud Server. We have to protect our data against the compromises of integrity, availability, and confidentiality. It doesn't matter whether you are using RDBMS, such as MySQL or MSSQL, or NoSQL, such as MongoDB or Firebase Realtime Database; all these databases have to be secured by restricting access to the data. In this chapter, we will briefly look at the common...