Skip to content

Commit 1add2b0

Browse files
committed
fixed acrolinx issue
1 parent bfb6596 commit 1add2b0

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

learn-pr/wwl-sci/implement-defender-databases/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Contoso Financial Services has platform-level security controls and a complete audit trail in place. But during a recent penetration test, SQL injection attacks bypassed input validation and extracted datawith no real-time alerts. The team also discovered that a misconfigured AI fraud detection service had been sending anomalous SQL queries for six days before anyone noticed. The access controls and audit logs recorded everything, but they didn't detect the threats as they happened.
1+
Contoso Financial Services has platform-level security controls and a complete audit trail in place. But during a recent penetration test, SQL injection attacks bypassed input validation and extracted datawith no real-time alerts. The team also discovered that a misconfigured AI fraud detection service is sending anomalous SQL queries for six days before anyone noticed. The "access controls" and "audit logs" record everything, but they didn't detect the threats as they happened.
22

33
The gap: Contoso has no active threat detection layer over its databases. Network controls and auditing are necessary but not sufficient. You need a service that monitors database activity, detects SQL injection attempts, identifies anomalous query patterns from AI services, and surfaces vulnerability exposures in real time.
44

0 commit comments

Comments
 (0)