TL;DR
Databases are the last firewall exception standing. Most organisations have built ZTNA or SSO for application access, but DBAs still connect directly to production databases with shared static passwords. That one open port (5432, 3306, 1433) invalidates every other control. Database access brokers, dynamic credentials, and SQL session recording close this gap. This is the complete map of tools in 2026.
The production database problem
Walk through the standard production database access scenario at most companies:
- DBA gets the production database password from 1Password (or worse, a Slack message).
- DBA opens a SQL client, connects directly to the database port.
- What they query is never logged.
- The password is never rotated because redeploying applications is hard.
- Three people on the team know the password.
- When the first person leaves, the password stays the same.
This is the norm. Every query against production customer data, financial records, or healthcare data is invisible. There is no audit trail. There is no per-query access control. Compliance auditors who dig deep enough find this scenario at 90% of organisations.
The solution architecture:
- No direct network access to the database port. The database is not reachable from the developer’s workstation without first traversing the access broker.
- Dynamic credentials. The developer authenticates with their SSO identity and receives a short-lived database credential scoped to their permissions.
- Every query logged. The broker captures both the SQL query and the result set size (not necessarily the data, but the metadata) for audit.
- Session recording. The full session is available for investigation.
1. HashiCorp Vault Database Secrets Engine
Category. Dynamic database credential generation. Not an access broker — a credential layer.
How it works. Vault connects to the database with admin credentials. When an application or user authenticates to Vault and requests a database credential, Vault creates a unique database user with the permissions defined in the Vault role, issues those credentials to the requestor, and schedules deletion of that database user at the TTL expiry. The requesting application never holds a long-lived credential; it holds a short-lived one tied to its Vault token.
Supported databases. PostgreSQL, MySQL, MariaDB, MSSQL, Oracle, MongoDB, Cassandra, Elasticsearch, Influx, Redis, Snowflake, and custom plugins.
Strengths. Dynamic credentials are the root fix for the shared-static-password problem. No two sessions share a credential. Database audit logs show a unique user per session, enabling attribution. Revocation is immediate if needed.
Limitations. Vault is a credential layer, not an access broker. There is no SQL query logging, no session recording, no per-query policy enforcement. After credential issuance, the connection goes directly to the database. Vault must be combined with database-side audit logging for compliance purposes.
Best fit. Any organisation with HashiCorp Vault deployed. Adding the database secrets engine is the highest ROI Vault configuration change for database access control.
2. Teleport Database Access
Category. Open-source infrastructure access broker with database session recording.
How it works. Teleport’s database service acts as a smart proxy between users and databases. Users connect to Teleport using short-lived certificates bound to their SSO identity. Teleport proxies the connection to the target database, logs all SQL queries and results, and records the session. Credentials are never provided to users — Teleport handles authentication to the database on behalf of the user.
Supported databases. PostgreSQL, MySQL, MariaDB, MongoDB, Redis, CockroachDB, Microsoft SQL Server, Snowflake, Cassandra, DynamoDB, Elasticsearch.
Strengths.
- Full session recording with SQL command history and table-level access logging.
- Access requests: developers request short-term database access through Teleport, requiring approval before the session is possible.
- No direct database network exposure — the database port is not reachable except through the Teleport proxy.
- Works with RDS IAM auth, combining dynamic cloud credentials with session recording.
- Open-source, self-hostable.
Limitations. Requires migration to Teleport as the access layer — replacing existing database connections with Teleport-proxied connections. Client tooling (DataGrip, psql) connects through a local Teleport proxy.
Best fit. Engineering orgs with Linux/Kubernetes/database infrastructure who want open-source database access control with session recording.
3. AWS RDS IAM Database Authentication
Category. Cloud-native dynamic credentials for RDS and Aurora.
How it works. RDS IAM authentication allows EC2 instances and IAM identities to obtain a time-limited authentication token (15-minute TTL) using their IAM role instead of a database password. The token is used as the password in the database connection string. No static passwords exist.
Supported databases. PostgreSQL, MySQL/MariaDB on RDS and Aurora.
Strengths. Zero cost, native to AWS, eliminates static database credentials for cloud workloads entirely. Combined with VPC security groups, the database is only reachable from specific IAM-identified sources.
Limitations. No query logging at the broker level — that requires RDS Performance Insights or pgaudit. No session recording. Human users need to generate tokens (achievable via CLI but more friction than a standard client connection).
Best fit. AWS workloads where application-level IAM auth is the primary goal. Add pgaudit or AWS CloudTrail for database-level query logging.
4. Teleport Access + AWS Session Manager for RDS
Best practice hybrid. Teleport database access combined with AWS SSM + RDS Proxy for a fully audited, zero-direct-access database connection path. The SSM session provides the network tunnel; Teleport provides the credential and session recording layer. For maximum compliance posture on AWS RDS, this is the architecture.
5. CyberArk Privilege Cloud (Database Access)
Category. Enterprise PAM database session management.
How it works. CyberArk Privilege Cloud manages database credentials in the vault and proxies privileged database sessions through the Privileged Session Manager. DBAs request database access, CyberArk injects the credential without revealing it, and the session is recorded with keystroke and query logging.
Supported databases. All major databases via Generic ODBC connector plus native connectors for Oracle, MSSQL, PostgreSQL, MySQL.
Strengths.
- Credential injection — DBAs never know the database password. This satisfies the strict reading of shared-knowledge-prohibition requirements in financial services.
- Session recording at the keystroke/query level linked to the credential checked out.
- DBA dual control: some operations require a second authorised DBA approval.
Limitations. Enterprise pricing and deployment complexity. CyberArk is the right tool at scale with a dedicated PAM team.
Best fit. Financial services, healthcare, and regulated enterprise with CyberArk already deployed.
6. BeyondTrust Remote Database Access
Category. PAM database session proxying and recording.
How it works. BeyondTrust Privileged Remote Access extends to database sessions, providing a web-based SQL interface proxied through BeyondTrust. Sessions are logged and recorded. Credentials are injected from the vault.
Strengths. Same single-pane approach as BeyondTrust PRA for SSH/RDP applies to databases. Useful for organisations managing IT support staff who also need database access.
Limitations. Less native SQL client support than Teleport. Database-specific SQL features (stored procedure debugging, execution plans) may not work through the proxy interface.
Best fit. BeyondTrust-deployed organisations extending PAM coverage to databases.
7. Strongdm
Category. Infrastructure access proxy covering databases, servers, Kubernetes, and apps.
How it works. StrongDM is a commercial infrastructure access gateway. Applications and users route database connections through the StrongDM gateway, which handles authentication, access control, and query logging. The gateway integrates with Okta, Azure AD, Google Workspace for SSO. Every query is logged in the StrongDM audit trail.
Supported databases. PostgreSQL, MySQL, MSSQL, Oracle, MongoDB, Cassandra, Redis, Snowflake, Elasticsearch, BigQuery, Redshift.
Strengths.
- All-in-one access gateway for databases, SSH, Kubernetes, web apps. One tool replaces VPN for infrastructure access.
- Query logging for all SQL databases.
- Integrations with Slack for access requests and SIEM for log forwarding.
- Fast deployment — typically running in days.
Limitations. SaaS vendor in the critical path for production database connections. High-availability configuration must be planned carefully. Commercial pricing.
Best fit. Mid-market to enterprise organisations wanting a commercial, supported alternative to building infrastructure access from scratch.
8. Aembit (Workload Identity for Databases)
Category. Workload-to-workload identity for database access (machine-to-machine).
How it works. Aembit provides workload identity for service-to-database connections. Applications authenticate to Aembit using their workload identity (Kubernetes service account, AWS IAM role, SPIFFE certificate), and Aembit provisions database credentials dynamically for each workload. No static database passwords in application configuration.
Strengths. Solves the service-account static credential problem — the same pattern that affects humans but at the application-to-database layer. Particularly relevant for serverless and container workloads where credential injection is difficult.
Limitations. Focused on machine-to-database access, not human-to-database administration. Does not provide session recording or DBA access workflow.
Best fit. Platform engineering teams focused on eliminating static credentials in application configurations.
9. Neon Branching + RBAC (for PostgreSQL)
Category. Database-level row-level security and branching for developer access.
How it works. Neon is a serverless PostgreSQL platform with instant branching. Each developer gets their own isolated database branch — a copy-on-write clone of production that reads from shared storage but writes to an isolated layer. Developers with isolated branches can never harm production data because they are not connected to it.
Strengths. Radical isolation: eliminating the risk of accidental production writes during debugging by giving developers a production snapshot branch. Combined with PostgreSQL row-level security (RLS), per-user data access policies are enforced at the database engine.
Limitations. Applicable to developer workflow, not production DBA access. Not relevant for organisations running self-hosted PostgreSQL or other databases. Neon is the serverless PostgreSQL platform; on-premises workloads cannot use branching.
Best fit. Developer access to production-like data for debugging and testing. Not a replacement for a production DBA access broker.
10. QuickZTNA Database Access Broker
Category. ZTNA-integrated database proxy (Workforce tier).
How it works. QuickZTNA’s database access broker provides a ZTNA-gated proxy to PostgreSQL, MySQL, and MSSQL databases. Developers connect through the ZTNA tunnel; the broker verifies their identity and device posture before establishing the database session. Credentials are dynamically issued for the session and logged. SQL query metadata (query type, table name, row count) is captured without logging data content, satisfying audit requirements while respecting data privacy.
Supported databases. PostgreSQL, MySQL, Microsoft SQL Server (current). MongoDB and Redis on roadmap.
Strengths.
- Single ZTNA architecture covers both network access and database access control. No separate database proxy to deploy and maintain.
- Device posture check at database session initiation — unmanaged devices are denied database access regardless of credential validity.
- SQL metadata audit log satisfies PCI-DSS Requirement 10 and SOC 2 database access monitoring without logging customer data.
- JIT access integration: database sessions can be gated behind an approval workflow with automatic session recording.
Limitations. Current database support is PostgreSQL, MySQL, MSSQL. Not yet a replacement for CyberArk or StrongDM for large enterprise environments with diverse database estates.
Best fit. Organisations running QuickZTNA Workforce who want database access control integrated with their existing ZTNA posture without deploying a separate tool.
Comparison table
| Tool | Dynamic credentials | Query logging | Session recording | JIT workflow | Self-hosted | Multi-DB |
|---|---|---|---|---|---|---|
| HashiCorp Vault DB SE | ✅ Best-in-class | ❌ | ❌ | Via Vault auth | ✅ | ✅ |
| Teleport DB Access | ✅ via certificates | ✅ | ✅ | ✅ | ✅ | ✅ |
| AWS RDS IAM Auth | ✅ 15min tokens | ❌ native | ❌ | ❌ | N/A | AWS only |
| CyberArk PC | ✅ vault-injected | ✅ | ✅ | ✅ | Optional | ✅ |
| BeyondTrust PRA | ✅ | ✅ | ✅ | ✅ | Appliance | ✅ |
| StrongDM | ✅ | ✅ | Query log | ✅ | ❌ | ✅ |
| Aembit | ✅ (workload) | ❌ | ❌ | ❌ | ❌ | ✅ |
| Neon Branching | N/A | PostgreSQL native | N/A | N/A | ❌ | PostgreSQL |
| QuickZTNA DB Broker | ✅ per-session | ✅ metadata | ✅ | ✅ | ❌ (SaaS) | Growing |
Implementation sequence
- Kill static credentials first. Deploy Vault database secrets engine or cloud-native IAM auth for all databases. This removes the shared static password problem at minimum cost.
- Add a proxy layer. Deploy Teleport database access or StrongDM. This closes the direct-network-access gap and enables query logging.
- Add JIT for admin sessions. Gate DBA access (full privileges) behind a JIT approval workflow so routine developer queries and rare admin operations have different access paths.
- Add session recording for compliance. All three of Teleport, CyberArk, StrongDM, and QuickZTNA can record database sessions. Connect recordings to your SIEM and compliance reports.
Related reading
- Top 10 Secrets Management Tools in 2026
- JIT Access Frameworks for Zero Trust
- What Is ZTNA and How Does It Compare to VPN
Try QuickZTNA Database Access
QuickZTNA Workforce includes a database access broker with ZTNA posture gating, JIT approval, and SQL metadata audit logging. Contact sales for early access to the database proxy feature.