Skip to content

Commit 424d057

Browse files
authored
Merge pull request #96445 from rachel-msft/edits1118
Add security overview, reorder TOC
2 parents 08695da + 41dcf1f commit 424d057

File tree

9 files changed

+185
-41
lines changed

9 files changed

+185
-41
lines changed

articles/mariadb/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,16 +49,18 @@
4949
href: concepts-limits.md
5050
- name: Data access & security
5151
items:
52-
- name: Firewall rules
53-
href: concepts-firewall-rules.md
52+
- name: Security overview
53+
href: concepts-security.md
5454
- name: Configuring SSL
5555
href: concepts-ssl-connection-security.md
56-
- name: Advanced Threat Protection
57-
href: concepts-data-access-and-security-threat-protection.md
58-
- name: Virtual Network
59-
href: concepts-data-access-security-vnet.md
6056
- name: Connectivity architecture
6157
href: concepts-connectivity-architecture.md
58+
- name: Firewall rules
59+
href: concepts-firewall-rules.md
60+
- name: Virtual Network
61+
href: concepts-data-access-security-vnet.md
62+
- name: Advanced Threat Protection
63+
href: concepts-data-access-and-security-threat-protection.md
6264
- name: Business continuity
6365
items:
6466
- name: Business continuity intro

articles/mariadb/concepts-security.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Security in Azure Database for MariaDB - Single Server
3+
description: An overview of the security features in Azure Database for MariaDB - Single Server.
4+
author: ajlam
5+
ms.author: andrela
6+
ms.service: mariadb
7+
ms.topic: conceptual
8+
ms.date: 11/25/2019
9+
---
10+
11+
# Security in Azure Database for MariaDB - Single Server
12+
13+
There are multiple layers of security that are available to protect the data on your Azure Database for MariaDB server. This article outlines those security options.
14+
15+
## Information protection and encryption
16+
17+
### In-transit
18+
Azure Database for MariaDB secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default.
19+
20+
### At-rest
21+
The Azure Database for MariaDB service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.
22+
23+
24+
## Network security
25+
Connections to an Azure Database for MariaDB server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
26+
27+
A newly created Azure Database for MariaDB server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
28+
29+
### IP firewall rules
30+
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
31+
32+
### Virtual network firewall rules
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for MariaDB server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-security-vnet.md).
34+
35+
36+
## Access management
37+
38+
While creating the Azure Database for MariaDB server, you provide credentials for an administrator user. This administrator can be used to create additional MariaDB users.
39+
40+
41+
## Threat protection
42+
43+
You can opt in to [Advanced Threat Protection](concepts-data-access-and-security-threat-protection.md) which detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit servers.
44+
45+
[Audit logging](concepts-audit-logs.md) is available to track activity in your databases.
46+
47+
48+
## Next steps
49+
- Enable firewall rules for [IPs](concepts-firewall-rules.md) or [virtual networks](concepts-data-access-security-vnet.md)

articles/mariadb/overview.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: andrela
66
ms.service: mariadb
77
ms.topic: overview
88
ms.custom: mvc
9-
ms.date: 08/13/2019
9+
ms.date: 11/25/2019
1010
---
1111

1212
# What is Azure Database for MariaDB?
@@ -48,11 +48,7 @@ Azure's industry-leading 99.99% availability SLA is powered by a global network
4848

4949
## Secure your data
5050

51-
Azure database services have a tradition of data security that Azure Database for MariaDB upholds. Azure Database for MariaDB offers features that limit access, protect data at rest and in motion, and help you monitor activity. Visit the [Azure Trust Center](https://www.microsoft.com/en-us/trustcenter/security) for information about Azure's platform security.
52-
53-
The Azure Database for MariaDB service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk with the exception of temporary files created while running queries. The service uses AES 256-bit cipher, which is included in Azure Storage encryption. The keys are system managed. Storage encryption is always on and can't be disabled.
54-
55-
By default, the Azure Database for MariaDB service is configured to require [SSL connection security](./concepts-ssl-connection-security.md) for data in motion across the network. Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. Optionally, you can disable the SSL requirement for connecting to your database service if your client application doesn't support SSL connectivity.
51+
Azure database services have a tradition of data security that Azure Database for MariaDB upholds. Azure Database for MariaDB offers features that limit access, protect data at rest and in motion, and help you monitor activity. Visit the [Azure Trust Center](https://www.microsoft.com/trustcenter/security) for information about Azure's platform security. For more information about Azure Database for MySQL security features, see the [security overview](concepts-security.md).
5652

5753
## Contacts
5854

articles/mysql/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -79,16 +79,18 @@
7979
href: concepts-limits.md
8080
- name: Data access & security
8181
items:
82-
- name: Firewall rules
83-
href: concepts-firewall-rules.md
82+
- name: Security overview
83+
href: concepts-security.md
8484
- name: Configuring SSL
8585
href: concepts-ssl-connection-security.md
86-
- name: Advanced Threat Protection
87-
href: concepts-data-access-and-security-threat-protection.md
86+
- name: Connectivity architecture
87+
href: concepts-connectivity-architecture.md
88+
- name: Firewall rules
89+
href: concepts-firewall-rules.md
8890
- name: Virtual Network
8991
href: concepts-data-access-and-security-vnet.md
90-
- name: Connectivity architecture
91-
href: concepts-connectivity-architecture.md
92+
- name: Advanced Threat Protection
93+
href: concepts-data-access-and-security-threat-protection.md
9294
- name: Business continuity
9395
items:
9496
- name: Business continuity intro

articles/mysql/concepts-security.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Security in Azure Database for MySQL - Single Server
3+
description: An overview of the security features in Azure Database for MySQL - Single Server.
4+
author: ajlam
5+
ms.author: andrela
6+
ms.service: mysql
7+
ms.topic: conceptual
8+
ms.date: 11/25/2019
9+
---
10+
11+
# Security in Azure Database for MySQL - Single Server
12+
13+
There are multiple layers of security that are available to protect the data on your Azure Database for MySQL server. This article outlines those security options.
14+
15+
## Information protection and encryption
16+
17+
### In-transit
18+
Azure Database for MySQL secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default.
19+
20+
### At-rest
21+
The Azure Database for MySQL service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.
22+
23+
24+
## Network security
25+
Connections to an Azure Database for MySQL server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
26+
27+
A newly created Azure Database for MySQL server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
28+
29+
### IP firewall rules
30+
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
31+
32+
### Virtual network firewall rules
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for MySQL server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-and-security-vnet.md).
34+
35+
36+
## Access management
37+
38+
While creating the Azure Database for MySQL server, you provide credentials for an administrator user. This administrator can be used to create additional MySQL users.
39+
40+
41+
## Threat protection
42+
43+
You can opt in to [Advanced Threat Protection](concepts-data-access-and-security-threat-protection.md) which detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit servers.
44+
45+
[Audit logging](concepts-audit-logs.md) is available to track activity in your databases.
46+
47+
48+
## Next steps
49+
- Enable firewall rules for [IPs](concepts-firewall-rules.md) or [virtual networks](concepts-data-access-and-security-vnet.md)

articles/mysql/overview.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: mysql
66
ms.author: andrela
77
ms.custom: mvc
88
ms.topic: overview
9-
ms.date: 08/13/2019
9+
ms.date: 11/25/2019
1010
---
1111

1212
# What is Azure Database for MySQL?
@@ -43,11 +43,7 @@ How do you decide when to dial up and down? You use the built-in performance mon
4343
Azure's industry leading 99.99% availability service level agreement (SLA), powered by a global network of Microsoft-managed datacenters, helps keep your app running 24/7. With every Azure Database for MySQL server, you take advantage of built-in security, fault tolerance, and data protection that you would otherwise have to buy or design, build, and manage. With Azure Database for MySQL, you can use point-in-time restore to recover a server to an earlier state, as far back as 35 days.
4444

4545
## Secure your data
46-
Azure database services have a tradition of data security that Azure Database for MySQL upholds, with features that limit access, protect data at-rest and in-motion, and help you monitor activity. Visit the [Azure Trust Center](https://www.microsoft.com/en-us/trustcenter/security) for information about Azure's platform security.
47-
48-
The Azure Database for MySQL service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk with the exception of temporary files created while running queries. The service uses AES 256-bit cipher that is included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and cannot be disabled.
49-
50-
By default, the Azure Database for MySQL service is configured to require [SSL connection security](./concepts-ssl-connection-security.md) for data in-motion across the network. Enforcing SSL connections between your database server and your client applications helps to protect against "man in the middle" attacks by encrypting the data stream between the server and your application. Optionally, you can disable requiring SSL for connecting to your database service if your client application does not support SSL connectivity.
46+
Azure database services have a tradition of data security that Azure Database for MySQL upholds, with features that limit access, protect data at-rest and in-motion, and help you monitor activity. Visit the [Azure Trust Center](https://www.microsoft.com/trustcenter/security) for information about Azure's platform security. For more information about Azure Database for MySQL security features, see the [security overview](concepts-security.md).
5147

5248
## Contacts
5349
For any questions or suggestions you might have about working with Azure Database for MySQL, send an email to the Azure Database for MySQL Team ([@Ask Azure DB for MySQL](mailto:[email protected])). This email address is not a technical support alias.

articles/postgresql/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,16 +84,18 @@
8484
href: concepts-limits.md
8585
- name: Data access and security
8686
items:
87-
- name: Firewall rules
88-
href: concepts-firewall-rules.md
87+
- name: Security overview
88+
href: concepts-security.md
8989
- name: Configure SSL
9090
href: concepts-ssl-connection-security.md
91-
- name: Advanced Threat Protection
92-
href: concepts-data-access-and-security-threat-protection.md
93-
- name: Virtual network
94-
href: concepts-data-access-and-security-vnet.md
9591
- name: Connectivity architecture
9692
href: concepts-connectivity-architecture.md
93+
- name: Firewall rules
94+
href: concepts-firewall-rules.md
95+
- name: Virtual network
96+
href: concepts-data-access-and-security-vnet.md
97+
- name: Advanced Threat Protection
98+
href: concepts-data-access-and-security-threat-protection.md
9799
- name: Azure AD authentication
98100
href: concepts-aad-authentication.md
99101
- name: Business continuity
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Security in Azure Database for PostgreSQL - Single Server
3+
description: An overview of the security features in Azure Database for PostgreSQL - Single Server.
4+
author: rachel-msft
5+
ms.author: raagyema
6+
ms.service: postgresql
7+
ms.topic: conceptual
8+
ms.date: 11/22/2019
9+
---
10+
11+
# Security in Azure Database for PostgreSQL - Single Server
12+
13+
There are multiple layers of security that are available to protect the data on your Azure Database for PostgreSQL server. This article outlines those security options.
14+
15+
## Information protection and encryption
16+
17+
### In-transit
18+
Azure Database for PostgreSQL secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default.
19+
20+
### At-rest
21+
The Azure Database for PostgreSQL service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.
22+
23+
24+
## Network security
25+
Connections to an Azure Database for PostgreSQL server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
26+
27+
A newly created Azure Database for PostgreSQL server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
28+
29+
### IP firewall rules
30+
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
31+
32+
### Virtual network firewall rules
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for PostgreSQL server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-and-security-vnet.md).
34+
35+
36+
## Access management
37+
38+
While creating the Azure Database for PostgreSQL server, you provide credentials for an administrator role. This administrator role can be used to create additional [PostgreSQL roles](https://www.postgresql.org/docs/current/user-manag.html).
39+
40+
You can also connect to the server using [Azure Active Directory (AAD) authentication](concepts-aad-authentication.md).
41+
42+
43+
## Threat protection
44+
45+
You can opt in to [Advanced Threat Protection](concepts-data-access-and-security-threat-protection.md) which detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit servers.
46+
47+
[Audit logging](concepts-audit.md) is available to track activity in your databases.
48+
49+
50+
## Next steps
51+
- Enable firewall rules for [IPs](concepts-firewall-rules.md) or [virtual networks](concepts-data-access-and-security-vnet.md)
52+
- Learn about [Azure Active Directory authentication](concepts-aad-authentication.md) in Azure Database for PostgreSQL

0 commit comments

Comments
 (0)