Summary
In this chapter, we saw that MySQL offers flexible tools that allow the fine-grained security configuration of virtually all database resources. We have a responsibility to research the security needs of organization stakeholders, age lever these security tools to protect the database resources entrusted to us and defend the organizations that rely on those resources.
In the next chapter, we'll return back to programming and see some of the methods that will be used to provide statistical data from the database.