Skip to content

Commit 05d1319

Browse files
authored
Merge pull request #97291 from DavidTrigano/patch-17
Update sql-database-data-discovery-and-classification.md
2 parents 8cf2e49 + 49760c0 commit 05d1319

File tree

1 file changed

+20
-16
lines changed

1 file changed

+20
-16
lines changed

articles/sql-database/sql-database-data-discovery-and-classification.md

Lines changed: 20 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,15 @@ An important aspect of the information protection paradigm is the ability to mon
122122

123123
![Audit log](./media/sql-data-discovery-and-classification/11_data_classification_audit_log.png)
124124

125-
### Manage classifications
125+
## <a id="subheading-4"></a>Permissions
126+
127+
The following built-in roles can read the data classification of an Azure SQL database: `Owner`, `Reader`, `Contributor`, `SQL Security Manager` and `User Access Administrator`.
128+
129+
The following built-in roles can modify the data classification of an Azure SQL database: `Owner`, `Contributor`, `SQL Security Manager`.
130+
131+
Learn more about [RBAC for Azure resources](https://docs.microsoft.com/azure/role-based-access-control/overview)
132+
133+
## <a id="subheading-5"></a>Manage classifications
126134

127135
# [T-SQL](#tab/azure-t-sql)
128136
You can use T-SQL to add/remove column classifications, as well as retrieve all classifications for the entire database.
@@ -146,40 +154,36 @@ You can also use REST APIs to programmatically manage classifications. The publi
146154

147155
- [List Recommended By Database](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/listrecommendedbydatabase) - Gets the recommended sensitivity labels of a given database
148156

149-
# [PowerShell Cmdlet for Azure SQL](#tab/azure-portal-sqldb)
150-
You can use PowerShell to get all the recommended columns in an Azure SQL database.
157+
# [PowerShell Cmdlet](#tab/azure-powelshell)
158+
You can use PowerShell to get all the recommended columns in an Azure SQL database and in a managed instance.
159+
160+
### PowerShell Cmdlet for Azure SQL database
151161
- [Get-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/get-azsqldatabasesensitivityclassification)
152162
- [Set-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/set-azsqldatabasesensitivityclassification)
153163
- [Remove-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/remove-azsqldatabasesensitivityclassification)
154164
- [Get-AzSqlDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/get-azsqldatabasesensitivityrecommendation)
155165
- [Enable-AzSqlDatabaSesensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/enable-azsqldatabasesensitivityrecommendation)
156166
- [Disable-AzSqlDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/disable-azsqldatabasesensitivityrecommendation)
157167

158-
# [PowerShell Cmdlets for Managed Instance](#tab/azure-powershell-mi)
159-
You can use PowerShell to get all the recommended columns in a managed instance.
168+
### PowerShell Cmdlets for Managed Instance
160169
- [Get-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/get-azsqlinstancedatabasesensitivityclassification)
161170
- [Set-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/set-azsqlinstancedatabasesensitivityclassification)
162171
- [Remove-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/remove-azsqlinstancedatabasesensitivityclassification)
163172
- [Get-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/get-azsqlinstancedatabasesensitivityrecommendation)
164173
- [Enable-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/enable-azsqlinstancedatabasesensitivityrecommendation)
165174
- [Disable-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/disable-azsqlinstancedatabasesensitivityrecommendation)
166175

167-
## Permissions
168-
169-
The following built-in roles can read the data classification of an Azure SQL database: `Owner`, `Reader`, `Contributor`, `SQL Security Manager` and `User Access Administrator`.
170-
171-
The following built-in roles can modify the data classification of an Azure SQL database: `Owner`, `Contributor`, `SQL Security Manager`.
172-
173-
Learn more about [RBAC for Azure resources](https://docs.microsoft.com/azure/role-based-access-control/overview)
176+
---
174177

175-
## <a id="subheading-5"></a>Next steps
178+
## <a id="subheading-6"></a>Next steps
176179

177180
- Learn more about [advanced data security](sql-database-advanced-data-security.md).
178181
- Consider configuring [Azure SQL Database Auditing](sql-database-auditing.md) for monitoring and auditing access to your classified sensitive data.
179182

180183
<!--Anchors-->
181-
[SQL data discovery & classification overview]: #subheading-1
184+
[What is data discovery & classification]: #subheading-1
182185
[Discovering, classifying & labeling sensitive columns]: #subheading-2
183186
[Auditing access to sensitive data]: #subheading-3
184-
[Automated/Programmatic classification]: #subheading-4
185-
[Next Steps]: #subheading-5
187+
[Permissions]: #subheading-4
188+
[Manage classifications]: #subheading-5
189+
[Next Steps]: #subheading-6

0 commit comments

Comments
 (0)