Posts by
Redgate Data Modeler

“Is It Secret? Is It Safe?” Handling Sensitive Data in Your Data Modeling

This is the second in a multi-part series on how to apply information security principles and techniques as part of data modeling. This series uses a simple data model designed to manage non-commercial clubs as an example of security approaches. In later articles, we will address modeling for fine-grained access controls, auditing, authentication,... Read more