Is anyone here familiar with File Integrity monitoring and SQL Injection prevention on Databases using HIDS?
So, if you need to detect and possibly prevent, how would differentiate between legitimate behavior? For example: We have DevOps that create modifications to databases on the fly when building instances in AWS and use scripts to auto login and make modifications.
How would we differentiate the difference between this activity? Session_Id with Src_IP with a whitelist?

: