# Data Sources

TrustLogix provides a unified security layer for managing **data access governance and monitoring** across various cloud and on-prem data platforms. To leverage TrustLogix’s capabilities, customers need to **register their data sources** within the platform.

#### **Supported Data Sources** <a href="#supported-data-sources" id="supported-data-sources"></a>

TrustLogix supports a wide range of structured data platforms, including:

* **Snowflake**
* **Databricks**
* **SQL Server**
* **Aurora RDS**
* **MySQL**

#### **Register Data Sources** <a href="#register-data-sources" id="register-data-sources"></a>

Registering data sources with TrustLogix allows organizations to:

* **Enforce Access Governance:** Define and enforce **RBAC, ABAC, and masking policies** to ensure least-privilege access.
* **Monitor Data and Entitlements:** Track **who is accessing data, how often, and whether access aligns with security policies**.
* **Analyze Usage Patterns:** Identify **sensitive data movement, excessive permissions, and policy misconfigurations**.
* **Detect and Prevent Security Risks:** Receive real-time alerts on **suspicious data activities**, privilege escalations, and compliance violations.

#### **How It Works** <a href="#how-it-works" id="how-it-works"></a>

1. **Register the Data Source:** Provide connection details for Snowflake, Databricks, SQL Server, Aurora RDS, or MySQL.
2. **Access To Metadata :** TrustLogix requires metadata related to data catalog and auditlogs to support access governance and monitoring capabilities.
3. **Configure Governance Policies:** Define **role-based, attribute-based, and masking policies** tailored to your security needs.
4. **Enable Monitoring & Reporting:** Gain **real-time visibility into access patterns, entitlement changes, and policy enforcement gaps**.
5. **Automate Compliance & Audits:** Generate **SOC 2, SOX, and CIS benchmark reports** to ensure regulatory compliance.

By integrating TrustLogix with your data sources, you gain full control over **data security, access governance, and compliance monitoring** without impacting performance.
