Chapter 2:
Operational Sovereignty: Controlling the "Who"
Operational sovereignty means you define and evidence who can operate and access systems without relying on vendor-mediated pathways or global support models.
- Access Authority: Access must be enforced through your own managed identity systems (SSO/OIDC), with role-based access control applied at the database level.
- Jurisdiction Scoped Support: Support models must respect boundaries so that critical incidents do not automatically route to global teams with unrestricted access.
- Audit Readiness: You must maintain comprehensive audit logs for all administrative actions, exported to your own governed SIEM.
- Percona Advantage: Percona does not hold a "master key" to your systems. Authentication and authorization are governed through your internal policies. Because our stack works across any architecture, your privileged commands execute within your audit framework, not a vendor's black box.