Skip to main content

Database

Overview

Visualize and analyze database resources, including tables, views, schemas, and queries. Monitor data access and usage to ensure security and compliance. Track performance metrics, identify vulnerabilities in database structures, and enable efficient data crawling for actionable insights. Automatically detect and categorize PII (Personally Identifiable Information) across tables and columns. Ensure robust backup and recovery processes while maintaining the integrity and security of sensitive data.

Configurations

ConfigurationDescription
Blueprint Account NameA human-readable name for your account that will be used to identify this account across the application.
HostThe address of your database server (e.g., waleed-test-us-east-2.redshift.amazonaws.com).
PortThe port number used to connect to your database (e.g., 5439 for Redshift).
User NameThe username used to log in to your database.
PasswordThe password associated with the username.
Database NameThe specific name of the database you want to connect to.
DialectThe type of database you are connecting to (e.g., Redshift, PostgreSQL, MySQL, SQLServer, etc.).
Data Crawl FrequencyThe frequency at which Kscope will crawl the database for new data.

Permissions

Postgres

  • pg_database
  • pg_namespace
  • pg_user
  • role_table_grants
  • pg_class
  • tables
  • table_constraints
  • key_column_usage
  • constraint_column_usage
  • pg_constraint
  • pg_attribute
  • pg_attrdef
  • triggers
  • views
  • pg_matviews
  • pg_tables
  • pg_roles
  • columns

MSSQL

  • sys.databases
  • sys.schemas
  • sys.tables
  • sys.partitions
  • sys.allocation_units
  • sys.procedures
  • INFORMATION_SCHEMA.VIEWS
  • sys.indexes
  • sys.dm_db_partition_stats
  • sys.columns
  • sys.key_constraints
  • sys.check_constraints
  • sys.default_constraints
  • sys.objects
  • INFORMATION_SCHEMA.COLUMNS
  • sys.triggers
  • sys.trigger_events
  • sys.sql_modules
  • sys.index_columns
  • sys.database_principals
  • sys.server_principals
  • sys.database_permissions
  • sys.foreign_keys
  • sys.foreign_key_columns
  • sys.extended_properties

MySQL

  • information_schema.schemata
  • information_schema.TABLES
  • information_schema.TABLE_CONSTRAINTS
  • information_schema.KEY_COLUMN_USAGE
  • information_schema.COLUMNS
  • information_schema.TRIGGERS
  • information_schema.STATISTICS
  • information_schema.ROUTINES
  • information_schema.VIEWS
  • mysql.user
  • mysql.db
  • information_schema.TABLE_PRIVILEGES
  • information_schema.statistics

For more details on the Database permissions, you can refer to the following documentation:

PII Detection and Categorization

The Database blueprint automatically detects and categorizes PII (Personally Identifiable Information) across your database tables and columns.

Supported PII Categories

CategoryExamples
CREDIT_CARD4111-1111-1111-1111
PERSONJohn Smith
PHONE_NUMBER+1-555-0100
URLhttps://example.com/user/123
EMAIL_ADDRESSjohn@example.com
IP_ADDRESS192.168.1.1
UUID550e8400-e29b-41d4-a716-446655440000
US_SSN123-45-6789
CRYPTOCryptocurrency wallet addresses
IBAN_CODEGB29NWBK60161331926819

Severity Levels

Each table with detected PII is assigned a severity level:

SeverityCategories
HighCREDIT_CARD, US_SSN, IBAN_CODE, CRYPTO
MediumEMAIL_ADDRESS, PHONE_NUMBER, PERSON, IP_ADDRESS
LowURL, UUID, or any other detected PII entity type

PII Detection Insights

The following actionable insights are generated in the PII Detection sightline:

InsightSeverityDescription
PII Tables Without Audit TriggersHighTables containing PII with no audit triggers configured. Without triggers, changes to sensitive data go untracked, creating compliance gaps. Action: Add INSERT/UPDATE/DELETE audit triggers.
Roles Bypassing Row-Level SecurityHighDatabase roles with BypassRowLevelSecurity enabled that can access all PII data unrestricted. Action: Revoke bypass RLS with ALTER ROLE role_name NOBYPASSRLS;.
High-Severity PII DetectedCriticalColumns containing credit card numbers, SSNs, bank account numbers, or IBAN codes. Action: Implement column-level encryption, data masking, or tokenization.

The PII Detection sightline also includes:

  • PII Tables stat card — total count of tables with detected PII
  • PII Categories Distribution chart — breakdown of PII types (PERSON, EMAIL_ADDRESS, CREDIT_CARD, etc.) across all detections

Schema Model

ResourcesSource EntityNormalized EntityDescription
Database Tabledatabase.sql.TableTableA table within a database.
Database Columndatabase.sql.ColumnColumnA column within a database table.
User Privilegedatabase.sql.UserPrivilegePrivilegeA user's privilege in the database.
Foreign Keydatabase.sql.ForeignKeyForeignKeyA foreign key relationship between columns.
Database Schemadatabase.sql.SchemaSchemaA schema within the database.
Database Userdatabase.sql.UserUserA user in the database system.
Database Roledatabase.sql.RoleRoleA role defined in the database system.
Database Constraintdatabase.sql.ConstraintConstraintA constraint applied to a database table.
Database Instancedatabase.sql.DatabaseDatabaseAn instance of a database.
Database Viewdatabase.sql.ViewViewA view in the database.
Materialized Viewdatabase.sql.MaterializedViewMaterializedViewA materialized view in the database.
Database Indexdatabase.sql.IndexIndexAn index applied to a table for efficiency.
Database Triggerdatabase.sql.TriggerTriggerA trigger applied to database tables.
PII Detection Resultdatabase.sql.PIIDetectionResultPIIDetectionResultPII detection result linked to tables and columns.
Database Proceduredatabase.sql.ProcedureProcedureA stored procedure in the database.
Database Clusterdatabase.sql.ClusterClusterA cluster of database instances.
Schema Accessdatabase.sql.SchemaAccessAccessAccess permissions for a schema.
Database Rowdatabase.sql.RowRowA row in a database table.