Security in MySQL: Part Two


 

Welcome back to this series about improving the security in your MySQL infrastructure. The first part of this series touched upon the reasons why should you consider securing your MySQL environment and walked you through some of the security basics. It covered what happens after MySQL-related data breaches and also told you that the security of any MySQL infrastructure can be conveniently split into several parts, the main ones being:

Access control. User security. The components and plugins that help keep MySQL safe from cyber crooks. Security considerations and general security guidelines. Enterprise-level security controls.

The first article