Skip to content

Commit 5f99651

Browse files
authored
Merge pull request #107332 from CarlRabeler/1672446-C
new pr
2 parents 04ad639 + 5bf15a3 commit 5f99651

15 files changed

+163
-309
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32814,6 +32814,11 @@
3281432814
"redirect_url": "/azure/role-based-access-control/built-in-roles",
3281532815
"redirect_document_id": true
3281632816
},
32817+
{
32818+
"source_path": "articles/sql-database/sql-database-control-access.md",
32819+
"redirect_url": "/azure/sql-database/sql-database-manage-logins",
32820+
"redirect_document_id": true
32821+
},
3281732822
{
3281832823
"source_path": "articles/active-directory/role-based-access-control-access-change-history-report.md",
3281932824
"redirect_url": "/azure/role-based-access-control/change-history-report",

articles/security/fundamentals/database-security-checklist.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,20 +24,20 @@ To help improve security, Azure Database includes a number of built-in security
2424

2525
These include:
2626

27-
- A firewall that enables you to create [firewall rules](../../sql-database/sql-database-firewall-configure.md) limiting connectivity by IP address,
28-
- Server-level firewall accessible from the Azure portal
29-
- Database-level firewall rules accessible from SSMS
30-
- Secure connectivity to your database using secure connection strings
31-
- Use access management
32-
- Data encryption
33-
- SQL Database auditing
34-
- SQL Database threat detection
27+
- A firewall that enables you to create [firewall rules](../../sql-database/sql-database-firewall-configure.md) limiting connectivity by IP address,
28+
- Server-level firewall accessible from the Azure portal
29+
- Database-level firewall rules accessible from SSMS
30+
- Secure connectivity to your database using secure connection strings
31+
- Use access management
32+
- Data encryption
33+
- SQL Database auditing
34+
- SQL Database threat detection
3535

3636
## Introduction
3737
Cloud computing requires new security paradigms that are unfamiliar to many application users, database administrators, and programmers. As a result, some organizations are hesitant to implement a cloud infrastructure for data management due to perceived security risks. However, much of this concern can be alleviated through a better understanding of the security features built into Microsoft Azure and Microsoft Azure SQL Database.
3838

3939
## Checklist
40-
We recommend that you read the [Azure Database Security Best Practices](database-best-practices.md) article prior to reviewing this checklist. You will be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that youve addressed the important issues in Azure database security.
40+
We recommend that you read the [Azure Database Security Best Practices](database-best-practices.md) article prior to reviewing this checklist. You will be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that you've addressed the important issues in Azure database security.
4141

4242

4343
|Checklist Category| Description|
@@ -46,11 +46,11 @@ We recommend that you read the [Azure Database Security Best Practices](database
4646
| <br> Encryption in Motion/Transit| <ul><li>[Transport Layer Security](https://docs.microsoft.com/windows-server/security/tls/transport-layer-security-protocol), for data encryption when data is moving to the networks.</li><li>Database requires secure communication from clients based on the [TDS(Tabular Data Stream)](https://msdn.microsoft.com/library/dd357628.aspx) protocol over TLS (Transport Layer Security).</li></ul> |
4747
|<br>Encryption at rest| <ul><li>[Transparent Data Encryption](https://go.microsoft.com/fwlink/?LinkId=526242), when inactive data is stored physically in any digital form.</li></ul>|
4848
|**Control Access**||
49-
|<br> Database Access | <ul><li>[Authentication](../../sql-database/sql-database-control-access.md) (Azure Active Directory Authentication) AD authentication uses identities managed by Azure Active Directory.</li><li>[Authorization](../../sql-database/sql-database-control-access.md) grant users the least privileges necessary.</li></ul> |
49+
|<br> Database Access | <ul><li>[Authentication](../../sql-database/sql-database-manage-logins.md) (Azure Active Directory Authentication) AD authentication uses identities managed by Azure Active Directory.</li><li>[Authorization](../../sql-database/sql-database-manage-logins.md) grant users the least privileges necessary.</li></ul> |
5050
|<br>Application Access| <ul><li>[Row level Security](https://msdn.microsoft.com/library/dn765131) (Using Security Policy, at the same time restricting row-level access based on a user's identity,role, or execution context).</li><li>[Dynamic Data Masking](../../sql-database/sql-database-dynamic-data-masking-get-started.md) (Using Permission & Policy, limits sensitive data exposure by masking it to non-privileged users)</li></ul>|
5151
|**Proactive Monitoring**||
5252
| <br>Tracking & Detecting| <ul><li>[Auditing](../../sql-database/sql-database-auditing.md) tracks database events and writes them to an Audit log/ Activity log in your [Azure Storage account](../../storage/common/storage-create-storage-account.md).</li><li>Track Azure Database health using [Azure Monitor Activity Logs](../../azure-monitor/platform/platform-logs-overview.md).</li><li>[Threat Detection](../../sql-database/sql-database-threat-detection.md) detects anomalous database activities indicating potential security threats to the database. </li></ul> |
53-
|<br>Azure Security Center| <ul><li>[Data Monitoring](../../security-center/security-center-enable-auditing-on-sql-databases.md) Use Azure Security Center as a centralized security monitoring solution for SQL and other Azure services.</li></ul>|
53+
|<br>Azure Security Center| <ul><li>[Data Monitoring](../../security-center/security-center-enable-auditing-on-sql-databases.md) Use Azure Security Center as a centralized security monitoring solution for SQL and other Azure services.</li></ul>|
5454

5555
## Conclusion
5656
Azure Database is a robust database platform, with a full range of security features that meet many organizational and regulatory compliance requirements. You can easily protect data by controlling the physical access to your data, and using a variety of options for data security at the file-, column-, or row-level with Transparent Data Encryption, Cell-Level Encryption, or Row-Level Security. Always Encrypted also enables operations against encrypted data, simplifying the process of application updates. In turn, access to auditing logs of SQL Database activity provides you with the information you need, allowing you to know how and when data is accessed.

articles/security/fundamentals/paas-applications-using-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ SQL Database default source IP address restrictions allow access from any Azure
6464

6565
To learn more about Azure SQL Firewall and IP restrictions, see:
6666

67-
- [Azure SQL Database and SQL Data Warehouse access control](../../sql-database/sql-database-control-access.md)
67+
- [Azure SQL Database and SQL Data Warehouse access control](../../sql-database/sql-database-manage-logins.md)
6868
- [Azure SQL Database and SQL Data Warehouse firewall rules](../../sql-database/sql-database-firewall-configure.md)
6969

7070

articles/sql-data-warehouse/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@
9494
- name: Access control
9595
items:
9696
- name: Overview
97-
href: ../sql-database/sql-database-control-access.md?toc=/azure/sql-data-warehouse/toc.json&bc=/azure/sql-data-warehouse/breadcrumb/toc.json
97+
href: ../sql-database/sql-database-manage-logins.md?toc=/azure/sql-data-warehouse/toc.json&bc=/azure/sql-data-warehouse/breadcrumb/toc.json
9898
- name: Column-level security
9999
href: column-level-security.md
100100
- name: Row-level security

articles/sql-database/elastic-jobs-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If you have not used Elastic jobs, [learn more about the job automation concepts
2929

3030
1. Create a credential for job execution in the *Job database* using [PowerShell](elastic-jobs-powershell.md) or [T-SQL](elastic-jobs-tsql.md#create-a-credential-for-job-execution).
3131
2. Define the target group (the databases you want to run the job against) using [PowerShell](elastic-jobs-powershell.md) or [T-SQL](elastic-jobs-tsql.md#create-a-target-group-servers).
32-
3. Create a job agent credential in each database the job will run [(add the user (or role) to each database in the group)](sql-database-control-access.md). For an example, see the [PowerShell tutorial](elastic-jobs-powershell.md).
32+
3. Create a job agent credential in each database the job will run [(add the user (or role) to each database in the group)](sql-database-manage-logins.md). For an example, see the [PowerShell tutorial](elastic-jobs-powershell.md).
3333
4. Create a job using [PowerShell](elastic-jobs-powershell.md) or [T-SQL](elastic-jobs-tsql.md#deploy-new-schema-to-many-databases).
3434
5. Add job steps using [PowerShell](elastic-jobs-powershell.md) or [T-SQL](elastic-jobs-tsql.md#deploy-new-schema-to-many-databases).
3535
6. Run a job using [PowerShell](elastic-jobs-powershell.md#run-the-job) or [T-SQL](elastic-jobs-tsql.md#begin-ad-hoc-execution-of-a-job).

0 commit comments

Comments
 (0)