Often with sensitive information, you need to have an audit log. Not just that a table had a select run, but that specific cells within the table were accessed.
Read full article on MySQL Server Blog
Often with sensitive information, you need to have an audit log. Not just that a table had a select run, but that specific cells within the table were accessed.
Read full article on MySQL Server Blog