No, SQLCLR code cannot do anything more in the database than the equivalent T-SQL code module, working under the same security context.
This has been and remains the most ignorant security requirement in all of SQL Server (especially since 2012), which can lead to disruption of UI communication with the SCCM database , the flagship ETL SSISDB deployment model (requires CLR), since a third-party security tool that inherits CIS tests ( mainly DBProtect), which also incorrectly marks SQL Server collation ratios through 2000, even if the server is down 2000, falsely directing database administrators to rebuild the wizard and permanently ruin their environment and applications as sensitive to register, if nobody talks about it. The CLR is not a security risk ; it allows flagship enhancements (after SQL Server 2012) to provide security in several ways with RDP and file system deletion rights and SSIS code management, for example. SSISDB, which can affect every 90% of SQL Server stores, including HA solutions that rely on not relying on a single SAN.
A note regarding database administrators who are simply not CLR-inclined because it’s “difficult to fix the problem if they are done poorly” - not mainly as part of DBA administration, troubleshooting older .NET developer code, if you hire bad database administrators, they it can also be difficult to fix the problem (see above by sorting). In addition, most people using the CLR do this for flagship functions and have little or nothing to do with writing CLR code (although script tasks in SSIS use this to some extent), and have much more in common with SSISDB and using groups SAN Availability. Database administrators who do not like this functionality should go into time mode and press stasis mode for 2008. This is written in terms of a full-stack BI / DBA, and not with some shortsighted internal sys point.
In addition, Availability Groups use the CLR , causing an error if the CLR is not enabled. Additional information also verified by Technet.
Both Availability Groups and SSISDB are the flagship features of today's SQL Server environments.
By enabling CLR and deploying SSIS packages through SSISDB now, you can mitigate the management and clutter of the file system, get legacy backup and even TDE service plans, and actually significantly reduce the need for RDP to eliminate the SSIS package.
Contact your database administrator if he cares so much about security with mixed-mode authentication, no SSL certificates for SSMS or SSRS or Excel clients, TDE is not enabled, and there is no audit or even registration of successful and unsuccessful logins.
http://www.codemag.com/article/0603031
To enable CLR, just run
sp_configure 'show advanced options', 1; GO RECONFIGURE; GO sp_configure 'clr enabled', 1; GO RECONFIGURE; GO