We have a series of Jenkins nodes that are used to deploy changes onto our SQL Servers, which works fine as long as everyone behaves and can be trusted.
The worry is that a rogue developer or hacker could simply add something like this into a Jenkins file and trash our data or performance:
node (production) {
stage ‘deploy_straight_to_prod’ {
…<do something bad here>
}
}
How do we protect against this? Ideally, only scripts that have been actively aproved by a DBA should be allowed.