On Your Watch
When a breach hits a database under your governance, the question the Information Regulator will ask is not whether the perimeter was defended. It will be whether you had active visibility into what was happening at the data layer – whether monitoring existed, whether access was governed, whether you can account for what was accessed and when.
Active visibility at the database layer is a specific practice, not a general aspiration. In its mature form it carries four disciplines.
The first is continuous monitoring of database activity itself – who is accessing what, from where, at what time, and against which objects. Not the activity of the application in front of the database, and not the network traffic on the wire, but the queries and administrative actions executed against the data estate. Without that telemetry, the 241-day average is the arithmetic of absence.
The second is governed privileged access. The database accounts that hold DBA-level rights are the ones capable of reading anything, extracting anything, and removing traces of having done so. Governance means those accounts exist in a reviewed, justified, time-bound form: who holds them, for what purpose, for how long, and with what approval. Standing privilege without expiry is the structural enabler of the slow, deliberate extraction pattern.
The third is vulnerability management specific to the database layer. Patch levels, configuration baselines, default credentials, exposed endpoints, deprecated protocols – tracked against the estate as a whole, not left to ad-hoc operational attention when a specific system breaks. The Verizon finding on vulnerability exploitation as a leading initial access vector is a database-layer observation being reported as a general one.
The fourth is the audit trail. A recorded, tamper-resistant log of what happened, available to produce on demand. The regulator’s question does not ask you what you think happened. It asks you what you can prove.
None of this is exotic. It is the operating discipline of a governed database estate – and it is the specific content of the question the Information Regulator will ask you.
Under POPIA’s current enforcement posture that question carries specific consequences: administrative penalties reaching R10 million, criminal liability for certain offences, and a notification obligation that requires you to report as soon as reasonably possible. The evidence of what happened needs to exist before you are asked to produce it.
South Africa’s regulatory environment has moved from advisory to enforcement. The direction of travel is toward less tolerance, not more. Governance at the data layer is no longer a best practice. It is an obligation with a measurable cost attached to its absence.