Skip to content

Commit 1ebb99b

Browse files
committed
updates for acrolinx
1 parent 45278b1 commit 1ebb99b

File tree

4 files changed

+27
-29
lines changed

4 files changed

+27
-29
lines changed

articles/security/fundamentals/database-security-checklist.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,15 @@ ms.subservice: security-fundamentals
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 01/28/2023
15+
ms.date: 01/29/2023
1616
ms.author: terrylan
1717
---
1818

1919
# Azure database security checklist
2020

21-
To help improve security, Azure Database includes a number of built-in security controls that you can use to limit and control access.
21+
To help improve security, Azure Database includes many built-in security controls that you can use to limit and control access.
2222

23-
These include:
23+
Security controls include:
2424

2525
* A firewall that enables you to create [firewall rules](/azure/azure-sql/database/firewall-configure) limiting connectivity by IP address,
2626
* Server-level firewall accessible from the Azure portal
@@ -35,7 +35,7 @@ These include:
3535
Cloud computing requires new security paradigms that are unfamiliar to many application users, database administrators, and programmers. As a result, some organizations are hesitant to implement a cloud infrastructure for data management due to perceived security risks. However, much of this concern can be alleviated through a better understanding of the security features built into Microsoft Azure and Microsoft Azure SQL Database.
3636

3737
## Checklist
38-
We recommend that you read the [Azure Database Security Best Practices](/azure/azure-sql/database/security-best-practice) article prior to reviewing this checklist. You will be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that you've addressed the important issues in Azure database security.
38+
We recommend that you read the [Azure Database Security Best Practices](/azure/azure-sql/database/security-best-practice) article prior to reviewing this checklist. You'll be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that you've addressed the important issues in Azure database security.
3939

4040

4141
|Checklist Category| Description|
@@ -51,7 +51,7 @@ We recommend that you read the [Azure Database Security Best Practices](/azure/a
5151
|<br>Microsoft Defender for Cloud| <ul><li>[Data Monitoring](../../security-center/security-center-remediate-recommendations.md) Use Microsoft Defender for Cloud as a centralized security monitoring solution for SQL and other Azure services.</li></ul>|
5252

5353
## Conclusion
54-
Azure Database is a robust database platform, with a full range of security features that meet many organizational and regulatory compliance requirements. You can easily protect data by controlling the physical access to your data, and using a variety of options for data security at the file-, column-, or row-level with Transparent Data Encryption, Cell-Level Encryption, or Row-Level Security. Always Encrypted also enables operations against encrypted data, simplifying the process of application updates. In turn, access to auditing logs of SQL Database activity provides you with the information you need, allowing you to know how and when data is accessed.
54+
Azure Database is a robust database platform, with a full range of security features that meet many organizational and regulatory compliance requirements. You can easily protect data by controlling the physical access to your data, and using various options for data security at the file-, column-, or row-level with Transparent Data Encryption, Cell-Level Encryption, or Row-Level Security. Always Encrypted also enables operations against encrypted data, simplifying the process of application updates. In turn, access to auditing logs of SQL Database activity provides you with the information you need, allowing you to know how and when data is accessed.
5555

5656
## Next steps
5757
You can improve the protection of your database against malicious users or unauthorized access with just a few simple steps. In this tutorial you learn to:

articles/security/fundamentals/event-support-ticket.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: security-fundamentals
1111
ms.topic: article
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 01/28/2023
14+
ms.date: 01/29/2023
1515
ms.author: terrylan
1616

1717
---
@@ -22,4 +22,4 @@ Visit the [Microsoft Security Response Center](https://msrc.microsoft.com/create
2222
You can also create a tailored, Azure support request in the Azure portal. Visit the Azure portal [here](https://ms.portal.azure.com/#create/Microsoft.Support). Follow the prompts to receive recommended solutions or to log a support request.
2323

2424
## Next steps
25-
[MSRC](https://msrc.microsoft.com/create-report) is part of the defender community. Learn more about how MSRC helps to protect customers and the broader ecosystm.
25+
[MSRC](https://msrc.microsoft.com/create-report) is part of the security community. Learn how MSRC helps to protect customers and the broader ecosystem.

0 commit comments

Comments
 (0)