Back to topics

Auditing UPSERTs in PostgreSQL 18: Change Tracking and Real-World Security Lessons

1 min read
113 words
Database Debates Auditing UPSERTs

PostgreSQL 18 promises to track what changed by your UPSERTs, turning ad-hoc logs into auditable trails. That idea hits a security nerve after EY's 4TB data leak spotlighted the risk of untracked backups. [1][2]

What PostgreSQL 18 Brings

The feature gives you visibility into the exact changes an UPSERT makes, helping teams understand data impact and tighten governance around writes.

Security Lessons from the EY Leak

  • The EY 4TB data leak involved exposed backups tied to SQL Server; it shows why untracked backups are a risk. [2]
  • Auditable change trails support risk management and compliance goals in real-world deployments.

Closing thought

Auditing UPSERTs isn't a gimmick—it's practical security hygiene for 2025.

References

[1]
HackerNews

PostgreSQL 18 – Track What Changed by Your UPSERTs

Discusses PostgreSQL 18 ability to track changes made by UPSERTs, offering insights, methods, and implications for auditing.

View source
[2]
HackerNews

EY 4TB Data Leak

EY data leak exposes 4TB SQL Server backup; linked report highlights security lapse and exposure of sensitive data.

View source

Want to track your own topics?

Create custom trackers and get AI-powered insights from social discussions

Get Started