Chapter 2:

Operational Sovereignty: Controlling the "Who"

Operational sovereignty means you define and evidence who can operate and access systems without relying on vendor-mediated pathways or global support models.

  • Access Authority: Access must be enforced through your own managed identity systems (SSO/OIDC), with role-based access control applied at the database level.
  • Jurisdiction Scoped Support: Support models must respect boundaries so that critical incidents do not automatically route to global teams with unrestricted access.
  • Audit Readiness: You must maintain comprehensive audit logs for all administrative actions, exported to your own governed SIEM.
  • Percona Advantage: Percona does not hold a "master key" to your systems. Authentication and authorization are governed through your internal policies. Because our stack works across any architecture, your privileged commands execute within your audit framework, not a vendor's black box.
Percona Sovereignty Resource Center
Speak to an expert