Gain an understanding of RAS, see how to configure APEX to honor RAS policies, and learn principles of vector table design to properly implement security.
We will demonstrate how to:
- Implement simple and complex RAS security policies with minimal code
- Enable RAS in APEX apps without major code changes
- Limit user access to sensitive data in any datatype, including VECTORs, to prevent accidental leakage of proprietary data to generative AI analytics
- Enforce the same security in direct-access SQL-only tools