ISO 27001 makes sure this never happens. It is the global standard for securing information systems. When applied to database access, it defines strict controls, clear policies, and documented procedures. It does not trust defaults. It demands evidence.
Database access under ISO 27001 means every query, connection, and credential is controlled. You define who can access which tables. You track every login and logout. You encrypt data in transit and at rest. You enforce role-based access control so that no one gets more privileges than they need.
Access control is part of Annex A, specifically A.9 (Access Control) and A.12 (Operations Security). For databases, this covers user ID management, password handling, key rotation, permission reviews, and secure configuration. Audit logs are not optional—they are active safeguards.