Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 6 – RLS Attack Mitigations As seen in the previous section, there are several ways bad actors can attempt to bypass RLS. Attacks range from removing RLS, getting data from... 03 October 2023 24 min read
Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 5 – RLS Attacks As mentioned in previous sections, RLS is an addition to security and should not be used as the primary method to limit access to data.... 25 September 2023 21 min read
Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 4 – Integration, Anti-patterns, and Alternatives One of the primary reasons to implement RLS is to facilitate reporting and ease the administrative burden. This section covers some considerations for using RLS... 17 September 2023 20 min read
Blogs Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 3 – Performance and Troubleshooting Previous sections gave a brief introduction to RLS, including some common use cases. They also showed how to implement RLS using a few different methods.... 10 September 2023 24 min read
Blogs Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 2 – Setup and Examples The previous section in this series was an introduction to Row Level Security (RLS) and some use cases. This section focuses on basic setup of... 03 September 2023 16 min read
Blogs Ben Johnston in Blogs SQL Server Row Level Security Deep Dive. Part 1 – Introduction and Use Cases My initial goal of documenting and exploring SQL Server Row Level Security (RLS) was to show the basic functionality and focus on a few performance... 01 August 2023 17 min read