17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10 – Layering SolutionsDesign for ProtectionFigure 10-1 illustrates how the HomeLending database is organized intological groupings. For example, the borrower names reside in theBorrower_Name table and the borrower's employer data resides in theBorrower_Employer table.Figure 10-1: Schema design of the HomeLending database.The Borrower_Identification, Borrower_Income,Asset_Account, Liability_Account and Credit_Report tables allcontain sensitive data. Through the normalized design of the database, thissensitive data is separated from the non-sensitive data. The Credit_Reporttable takes advantage of a linked server to further the separation of sensitivedata that is contained within that table.Applied Permissions and Database ObjectsThe HomeLending database contains the database roles Sensitive_high,Sensitive_medium and Sensitive_low, which provides us the means tocontrol access to database objects. Each database user that exists in theHomeLending database is assigned membership to one of these databaseroles.201

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!