• Sergiy (3/24/2013)


    opc.three (3/24/2013)


    But consider the employee in the sysadmin Role looking to steal data without being detected.

    And?

    How adding an "sp_configure" command to a script used for stealing data will help to detect who's behind the SA user?

    Version control. Change management processes. Code review. Layers...

    There are no special teachers of virtue, because virtue is taught by the whole community.
    --Plato