Skip to content

Commit 42aa48e

Browse files
committed
updates to concept guide
1 parent 6a94397 commit 42aa48e

File tree

2 files changed

+31
-13
lines changed

2 files changed

+31
-13
lines changed

articles/purview/concept-policies-devops.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,16 +40,29 @@ The role maps to a set of actions that the policy permits on the data resource.
4040
A DevOps policy on a data resource is enforced on the data resource itself and all children contained by it. For example, a DevOps policy on an Azure subscription applies to all resource groups, to all policy-enabled data sources within each resource group, and to all databases contained within each data source.
4141

4242
## A sample scenario to demonstrate the concept and the benefits
43-
Bob and Alice are involved with the DevOps process at their company. Given their role, they need to log in to dozens of Azure SQL logical servers to monitor their performance so that critical DevOps processes don’t break. Their manager, Mateo, creates an Azure AD group and includes Alice and Bob. He then uses Microsoft Purview DevOps policies (Policy 1 in the diagram below) to grant this Azure AD group access to Resource Group 1, which hosts the Azure SQL servers.
43+
Bob and Alice are involved with the DevOps process at their company. Given their role, they need to log in to dozens of SQL servers on-premise and Azure SQL logical servers to monitor their performance so that critical DevOps processes don’t break. Their manager, Mateo, puts all these SQL data sources into Resource Group 1. He then creates an Azure AD group and includes Alice and Bob. Next, he uses Microsoft Purview DevOps policies (Policy 1 in the diagram below) to grant this Azure AD group access to Resource Group 1, which hosts the Azure SQL servers.
4444

4545
![Diagram shows an example of DevOps policy on resource group.](./media/concept-policies-devops/devops-policy-on-resource-group.png).
4646

4747
#### These are the benefits:
48-
- Mateo doesn't have to create local logins in each logical server
49-
- The policies from Microsoft Purview improve security by helping limit local privileged access. This is what we call PoLP (Principle of Least Privilege). In the scenario, Mateo only grants the minimum access necessary that Bob and Alice need to perform the task of monitoring system health and performance.
50-
- When new Azure SQL servers are added to the resource group, Mateo doesn't need to update the policy in Microsoft Purview for it to be enforced on the new logical servers.
48+
- Mateo doesn't have to create local logins in each SQL server.
49+
- The policies from Microsoft Purview improve security by limiting local privileged access. They support the Principle of Least Privilege (PoLP). In the scenario, Mateo only grants the minimum access necessary that Bob and Alice need to perform the task of monitoring system health and performance.
50+
- When new SQL servers are added to the resource group, Mateo doesn't need to update the policy in Microsoft Purview for it to be enforced on the new SQL servers.
5151
- If Alice or Bob leave their job and get backfilled, Mateo just updates the Azure AD group, without having to make any changes to the servers or to the policies he created in Microsoft Purview.
52-
- At any point in time, Mateo or the company’s auditor can see what access has been granted directly in Microsoft Purview Studio.
52+
- At any point in time, Mateo or the company’s auditor can see all the permissions that were granted directly in Microsoft Purview Studio.
53+
54+
| **Principle** | **Benefit** |
55+
|-|-|
56+
|*Simplify* |The role definitions SQL Performance Monitor and SQL Security AuditorData capture the permissions that typical IT/DevOps personas need to execute their job.|
57+
| |Reduce the need of permission expertise for each data source type.|
58+
|||
59+
|*Reduce effort* |Graphical interface lets you navigate the data object hierarchy quickly.|
60+
| |Supports policies on entire Azure resource groups and subscriptions.|
61+
|||
62+
|*Enhance security*|Access is granted centrally and can be easily reviewed and revoked.|
63+
| |Reduces the need for privileged accounts to configure access directly at the data source.|
64+
| |Supports the Principle of Least Privilege via data resource scopes and the role definitions.|
65+
|||
5366

5467
## Mapping of popular DMVs/DMFs
5568
SQL dynamic metadata includes a list of more than 700 DMVs/DMFs. We list here as an illustration some of the most popular ones, mapped to their role definition in Microsoft Purview DevOps policies and linked to the URL, along with their description.

articles/purview/overview.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -115,14 +115,19 @@ Discovering and understanding data sources and their use is the primary purpose
115115

116116
At the same time, users can contribute to the catalog by tagging, documenting, and annotating data sources that have already been registered. They can also register new data sources, which are then discovered, understood, and consumed by the community of catalog users.
117117

118-
Lastly, Microsoft Purview Data Policy app applies the metadata in the Data Map, providing a superior solution to keep your data secure.
119-
* Structure and simplify the process of granting/revoking access.
120-
* Reduce the effort of access provisioning.
121-
* Access decision in Microsoft data systems has negligible latency penalty.
122-
* Enhanced security:
123-
- Easier to review access/revoke it in a central vs. distributed access provisioning model.
124-
- Reduced need for privileged accounts to configure access.
125-
- Support Principle of Least Privilege (give people the appropriate level of access, limiting to the minimum permissions and the least data objects).
118+
Lastly, Microsoft Purview Data Policy app provides a superior solution to keep your data secure. Here are the benefits of the Data Policy app:
119+
| **Principle** | **Benefit** |
120+
|-|-|
121+
|*Simplify* |Permissions are bundled into role definitions that are abstracted and consistent across data source types, like Read and Modify.|
122+
| |Reduce the need of permission expertise for each data source type.|
123+
|||
124+
|*Reduce effort* |Graphical interface lets you navigate the data object hierarchy quickly.|
125+
| |Supports policies on entire Azure resource groups and subscriptions.|
126+
|||
127+
|*Enhance security*|Access is granted centrally and can be easily reviewed and revoked.|
128+
| |Reduces the need for privileged accounts to configure access directly at the data source.|
129+
| |Supports the Principle of Least Privilege via data resource scopes and common role definitions.|
130+
|||
126131

127132
## In-region data residency
128133

0 commit comments

Comments
 (0)