It’s become a natural reaction: when exiting your home or automobile, you take a moment to lock the doors and set the alarm. You do so because you know that neglecting to take such rudimentary yet effective precautions dramatically increases the possibility of your property being stolen or damaged. Ironically, the IT industry at large seems to take the opposite approach. Despite the prevalence of intellectual property theft and damage within corporate IT systems, many developers continue to invest minimal time and effort into creating secure computing environments. This despite many software products, MySQL included, offering powerful built-in security features with minimal configuration requirements. In this chapter, I'll introduce MySQL's highly effective privilege-based access model, demonstrating through numerous examples just how easy it is to add a seemingly impenetrable layer of security to your database.