Jason Mathis wrote:
> someone “sneaking in” a change. Or even think about data recovery, “what time did you drop that production table?”
Whaaat? You need to do a security review *now*. These possibilities indicate anarchy, and are a sure recipe for
disaster.Someone has dropped a production table and you want it to be logged, or to be emailed about it?
You don't *grant* privileges to drop production tables to all and sundry.