The database never forgets. Once data is written and locked by immutability rules, it stands beyond revision, unaltered by human error or malicious intent. This is not ideology—it is design. Immutability reshapes database roles, shifting how permissions, workflows, and security boundaries are defined.
In a mutable database, roles often center on granting read, write, and update powers. Updates overwrite history. Mistakes erase truth. In an immutable database, the write path is one-way. Roles no longer govern who can “change” data, only who can append and who can query. The result is a radically simplified authorization model anchored in integrity. Permissions pivot around three core actions: append, read, and manage schema evolution.
Append-only roles protect records from being tampered with. Every insert is preserved in a permanent log. Read roles allow full visibility without the power to alter past entries. Schema manager roles can evolve structure but cannot retroactively modify stored facts. This separation eliminates the risk of retroactive edits, enforces trust in audits, and streamlines security policies.