A system and method for verifying database security across multiple platforms
is
presented. Servers are queried to obtain a user id access list of a particular
database, directory, or file. The user id access list is compared with a validated
access list. A report file is generated that includes user id's that have access
to a database, directory, or file but do not have proper permission. The report
file includes a submission of how to correct each security violation.