What the Discipline Requires
Governing the database layer means four things, each addressing a specific gap that the incidents above expose.
Real-time activity monitoring is the foundation – continuous visibility into all database activity, with automated detection and blocking of suspicious behaviour and policy violations as they occur. Not periodic review. This is what compresses the 241-day identify-and-contain timeline; nothing running on a daily or weekly schedule can.
A structured vulnerability and configuration assessment runs alongside it – ongoing evaluation of patch levels, configuration settings, and known exposures across every database in the environment. Where production systems cannot be immediately patched, virtual patching provides interim protection. Most significant breaches do not require sophisticated exploits. They require an unaddressed vulnerability and enough time.
Access governance must be enforced at the database layer itself – fine-grained controls that restrict high-risk operations, enforce segregation of duties, and apply least-privilege principles as an actively enforced control at the data layer, not as a policy aspiration. Privilege abuse – whether by an external attacker using a compromised credential or an internal user exceeding their mandate – cannot be contained by documentation alone.
An automated compliance and audit trail closes the loop. POPIA’s notification obligation requires reporting as soon as reasonably possible – which means the evidence of what was accessed and when must already exist before the incident occurs, not be assembled in response to one.