Introduction IT Security teams and IT auditors typically demand to enable the database audit trace functionality. This requirement often collides with real-world IT, because the implementation and management cost of it is heavily underestimated. To look deeper into the reasons of the high implementation cost for this particular function together with the security benefits of… Continue reading »