Conclusion

The database is where most privacy breaches occur. Several steps can be taken to limit the risk of exposure of sensitive data, including removing the sensitive data before it is stored in a database or limiting access to it after it is stored in the database. This is part of the minimization principle that should be applied to data throughout its lifecycle. That is, minimize the data that you collect, minimize access to the data, and minimize the amount of time that you keep the data.

The types of protection you can use to protect data in a database include the following:

  • Physical security

  • Programmatic security

  • Transaction auditing

  • Data minimization

  • Data obfuscation

  • Data quantization

  • Query limitation

  • Data suppression

  • Data encryption

  • Data perturbation ...

Get Privacy What Developers and IT Professionals Should Know now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.