Database connection strings with credentials

Identifies database connection strings with credentials patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
category-aware structural regex with anchor and context constraints replaces phrase-only detection. Added context gating and exclusion rules improve precision and reduce incidental matches.
Detection quality
Not detected
Jurisdictions
global
Regulations
GDPR
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:connection\s+string|database\s+credentials|sql\s+server|data\s+source|integrated\s+security|trusted\s+connection)\b

Corroborative evidence keywords

database connection strings with credentials, database, connection, strings, credentials, keys, secrets, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+43 more)

Proximity: 300 characters

Should match

Should not match

Known false positives