You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-security-best-practice.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -481,7 +481,7 @@ Another technique for preventing unauthorized users from viewing data is to obfu
481
481
Network security refers to access controls and best practices to secure your data in transit to Azure SQL Database.
482
482
483
483
### Configure my client to connect securely to Azure SQL Database
484
-
Prevent client machines and applications connecting to Azure SQL Database from well-known vulnerabilities. Older protocols and cipher suites have known vulnerabilities.
484
+
Best practices on how to prevent client machines and applications with well-known vulnerabilities (for example, using older TLS protocols and cipher suites) from connecting to Azure SQL Database.
485
485
486
486
**How to implement**:
487
487
@@ -498,9 +498,10 @@ Prevent client machines and applications connecting to Azure SQL Database from w
498
498
499
499
- Check cipher suites available on the client: [Cipher Suites in TLS/SSL (Schannel SSP)](https://docs.microsoft.com/windows/desktop/SecAuthN/cipher-suites-in-schannel). Specifically, disable 3DES per [Configuring TLS Cipher Suite Order](https://docs.microsoft.com/windows-server/security/tls/manage-tls#configuring-tls-cipher-suite-order).
500
500
501
-
- If you're using a managed instance, use the **Proxy** connection type (default) as this enforces encryption from the server side. The **Redirect** connection type currently doesn't support encryption enforcement and is only available on private IP connections.
502
-
- For more information, see [Azure SQL Connectivity Architecture - Connection policy](sql-database-connectivity-architecture.md#connection-policy).
503
-
- Encryption is enforced for both Proxy and Redirect connection types.
501
+
- For Azure SQL Database, encryption is enforced for both Proxy and Redirect connection types. If you're using a managed instance, use the **Proxy** connection type (default) as this enforces encryption from the server side. The **Redirect** connection type currently doesn't support encryption enforcement and is only available on private IP connections.
502
+
503
+
- For more information, see [Azure SQL Connectivity Architecture - Connection policy](sql-database-connectivity-architecture.md#connection-policy).
504
+
504
505
505
506
### Minimize Attack Surface
506
507
Minimize the number of features that can be attacked by a malicious user. Implement network access controls for Azure SQL Database.
@@ -512,7 +513,7 @@ Minimize the number of features that can be attacked by a malicious user. Implem
512
513
In an Azure SQL Database server (containing singleton database or elastic pools):
513
514
- Set Allow Access to Azure services to OFF.
514
515
515
-
- Use virtual network Service endpoints and virtual network Firewall Rules.
516
+
- Use VNet Service endpoints and VNet Firewall Rules.
516
517
517
518
- Use Private Link (preview).
518
519
@@ -522,8 +523,8 @@ In a managed instance:
522
523
**Best practices**:
523
524
524
525
- Restricting access to Azure SQL Database by connecting on a private endpoint (for example, using a private data path):
525
-
- A managed instance can be isolated inside a virtual network to prevent external access. Applications and tools that are in the same or peered virtual network in the same region could access it directly. Applications and tools that are in different region could use VNet-to-VNet connection or ExpressRoute circuit peering to establish connection. Customer should use Network Security Groups (NSG) to restrict access over port 1433 only to resources that require access to a managed instance
526
-
- For a SQL Database server (containing single databases or elastic pools), use the [Private Link](sql-database-private-endpoint-overview.md) feature that provides a dedicated private IP for the SQL Database server inside your virtual network. You can also use [virtual network Service endpoints with virtual network Firewall Rules](sql-database-vnet-service-endpoint-rule-overview.md) to restrict access to your SQL Database servers.
526
+
- A managed instance can be isolated inside a VNet to prevent external access. Applications and tools that are in the same or peered VNet in the same region could access it directly. Applications and tools that are in different region could use VNet-to-VNet connection or ExpressRoute circuit peering to establish connection. Customer should use Network Security Groups (NSG) to restrict access over port 1433 only to resources that require access to a managed instance
527
+
- For a SQL Database server (containing single databases or elastic pools), use the [Private Link](sql-database-private-endpoint-overview.md) feature that provides a dedicated private IP for the SQL Database server inside your VNet. You can also use [VNet Service endpoints with VNet Firewall Rules](sql-database-vnet-service-endpoint-rule-overview.md) to restrict access to your SQL Database servers.
527
528
- Mobile users should use point-to-site VPN connections to connect over the data path.
528
529
- Users connected to their on-premises network should use site-to-site VPN connection or ExpressRoute to connect over the data path.
529
530
@@ -596,7 +597,7 @@ Distributed Denial of Service (DDoS) attacks are attempts by a malicious user to
596
597
597
598
DDoS protection is automatically enabled as part of the Azure Platform. It includes always-on traffic monitoring and real-time mitigation of network-level attacks on public endpoints.
598
599
599
-
- Use [Azure DDoS Protection](../virtual-network/ddos-protection-overview.md) to monitor public IP addresses associated to resources deployed in virtual networks.
600
+
- Use [Azure DDoS Protection](../virtual-network/ddos-protection-overview.md) to monitor public IP addresses associated to resources deployed in VNets.
600
601
601
602
- Use [Advanced Threat Protection for Azure SQL Database](sql-database-threat-detection-overview.md) to detect Denial of Service (DoS) attacks against databases.
0 commit comments