IT Security | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...