The Six Hats Six Coats Framework’s first row deals with entities.
Let’s remind ourselves more visually:
In an earlier post I laid out the rows and columns for an entity security table. I’ve now abstractly filled in the cells and will share it with you:
Forgive me for coining new terms to make a consistent vocabulary.
How can these security breaches be described? First, the SELECT manipulation recognizes the instance it is dealing with. Second, the INSERT manipulation adds instances. Third, the UPDATE manipulation corrupts the original instance. Fourth, the DELETE manipulation destroys the instance. Realize that an instance can be a physical goal, a physical person, a physical function, a physical datum, a physical event or a physical node.