Skip to content

Commit 849684e

Browse files
Merge pull request #110267 from DavidTrigano/patch-4
Update sql-database-data-discovery-and-classification.md
2 parents f96066f + ba9f02d commit 849684e

File tree

2 files changed

+19
-28
lines changed

2 files changed

+19
-28
lines changed

articles/sql-database/sql-database-data-discovery-and-classification.md

Lines changed: 18 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ tags: azure-synapse
1818

1919
Data Discovery & Classification provides advanced capabilities built into Azure SQL Database for **discovering**, **classifying**, **labeling** & **reporting** the sensitive data in your databases.
2020

21-
Discovering and classifying your most sensitive data (business, financial, healthcare, personally identifiable data (PII), and so on.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
21+
Discovering and classifying your most sensitive data (business, financial, healthcare, personally identifiable data, and so on.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
2222

2323
- Helping meet data privacy standards and regulatory compliance requirements.
2424
- Various security scenarios, such as monitoring (auditing) and alerting on anomalous access to sensitive data.
@@ -29,7 +29,7 @@ Data Discovery & Classification is part of the [Advanced Data Security](sql-data
2929
> [!NOTE]
3030
> This document relates to Azure SQL Database and Azure Synapse. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse. For SQL Server (on premises), see [SQL Data Discovery and Classification](https://go.microsoft.com/fwlink/?linkid=866999).
3131
32-
## <a id="subheading-1"></a>What is data discovery & classification
32+
## <a id="what-is-dc"></a>What is data discovery & classification
3333

3434
Data Discovery & Classification introduces a set of advanced services and new SQL capabilities, forming a new SQL Information Protection paradigm aimed at protecting the data, not just the database:
3535

@@ -49,23 +49,23 @@ Data Discovery & Classification introduces a set of advanced services and new SQ
4949

5050
The database classification state can be viewed in a detailed dashboard in the portal. Additionally, you can download a report (in Excel format) to be used for compliance & auditing purposes, as well as other needs.
5151

52-
## <a id="subheading-2"></a>Discover, classify & label sensitive columns
52+
## <a id="discover-classify-columns"></a>Discover, classify & label sensitive columns
5353

5454
The following section describes the steps for discovering, classifying, and labeling columns containing sensitive data in your database, as well as viewing the current classification state of your database and exporting reports.
5555

5656
The classification includes two metadata attributes:
5757

58-
- Labels – The main classification attributes, used to define the sensitivity level of the data stored in the column.
59-
- Information Types – Provide additional granularity into the type of data stored in the column.
58+
- **Labels** – The main classification attributes, used to define the sensitivity level of the data stored in the column.
59+
- **Information Types** – Provide additional granularity into the type of data stored in the column.
6060

6161
## Define and customize your classification taxonomy
6262

6363
Data Discovery & Classification comes with a built-in set of sensitivity labels and a built-in set of information types and discovery logic. You now have the ability to customize this taxonomy and define a set and ranking of classification constructs specifically for your environment.
6464

6565
Definition and customization of your classification taxonomy is done in one central place for your entire Azure tenant. That location is in [Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-intro), as part of your Security Policy. Only someone with administrative rights on the Tenant root management group can perform this task.
6666

67-
As part of the Information Protection policy management, you can define custom labels, rank them, and associate them with a selected set of information types. You can also add your own custom information types and configure them with string patterns, which are added to the discovery logic for identifying this type of data in your databases.
68-
Learn more about customizing and managing your policy in the [Information Protection policy how-to guide](https://go.microsoft.com/fwlink/?linkid=2009845&clcid=0x409).
67+
As part of the SQL Information Protection policy management, you can define custom labels, rank them, and associate them with a selected set of information types. You can also add your own custom information types and configure them with string patterns, which are added to the discovery logic for identifying this type of data in your databases.
68+
Learn more about customizing and managing your policy in the [SQL Information Protection policy how-to guide](https://go.microsoft.com/fwlink/?linkid=2009845&clcid=0x409).
6969

7070
Once the tenant-wide policy has been defined, you can continue with the classification of individual databases using your customized policy.
7171

@@ -105,23 +105,23 @@ Once the tenant-wide policy has been defined, you can continue with the classifi
105105

106106
8. To complete your classification and persistently label (tag) the database columns with the new classification metadata, click on **Save** in the top menu of the window.
107107

108-
## <a id="subheading-3"></a>Auditing access to sensitive data
108+
## <a id="audit-sensitive-data"></a>Auditing access to sensitive data
109109

110110
An important aspect of the information protection paradigm is the ability to monitor access to sensitive data. [Azure SQL Database Auditing](sql-database-auditing.md) has been enhanced to include a new field in the audit log called *data_sensitivity_information*, which logs the sensitivity classifications (labels) of the actual data that was returned by the query.
111111

112112
![Audit log](./media/sql-data-discovery-and-classification/11_data_classification_audit_log.png)
113113

114-
## <a id="subheading-4"></a>Permissions
114+
## <a id="permissions"></a>Permissions
115115

116116
The following built-in roles can read the data classification of an Azure SQL database: `Owner`, `Reader`, `Contributor`, `SQL Security Manager` and `User Access Administrator`.
117117

118118
The following built-in roles can modify the data classification of an Azure SQL database: `Owner`, `Contributor`, `SQL Security Manager`.
119119

120120
Learn more about [RBAC for Azure resources](https://docs.microsoft.com/azure/role-based-access-control/overview)
121121

122-
## <a id="subheading-5"></a>Manage classifications
122+
## <a id="manage-classification"></a>Manage classifications
123123

124-
# [T-SQL](#tab/azure-t-sql)
124+
### Using T-SQL
125125
You can use T-SQL to add/remove column classifications, as well as retrieve all classifications for the entire database.
126126

127127
> [!NOTE]
@@ -131,8 +131,8 @@ You can use T-SQL to add/remove column classifications, as well as retrieve all
131131
- Remove the classification from one or more columns: [DROP SENSITIVITY CLASSIFICATION](https://docs.microsoft.com/sql/t-sql/statements/drop-sensitivity-classification-transact-sql)
132132
- View all classifications on the database: [sys.sensitivity_classifications](https://docs.microsoft.com/sql/relational-databases/system-catalog-views/sys-sensitivity-classifications-transact-sql)
133133

134-
# [Rest APIs](#tab/azure-rest-api)
135-
You can use REST APIs to programmatically manage classifications and recommendations. The published REST APIs support the following operations:
134+
### Using Rest API
135+
You can use REST API to programmatically manage classifications and recommendations. The published REST API support the following operations:
136136

137137
- [Create Or Update](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/createorupdate) - Creates or updates the sensitivity label of a given column
138138
- [Delete](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/delete) - Deletes the sensitivity label of a given column
@@ -142,37 +142,28 @@ You can use REST APIs to programmatically manage classifications and recommendat
142142
- [List Current By Database](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/listcurrentbydatabase) - Gets the current sensitivity labels of a given database
143143
- [List Recommended By Database](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/listrecommendedbydatabase) - Gets the recommended sensitivity labels of a given database
144144

145-
# [PowerShell Cmdlet](#tab/azure-powelshell)
145+
### Using PowerShell Cmdlet
146146
You can use PowerShell to manage classifications and recommendations for Azure SQL Database and Managed Instance.
147147

148-
### PowerShell Cmdlet for Azure SQL Database
148+
#### PowerShell Cmdlet for Azure SQL Database
149149
- [Get-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/get-azsqldatabasesensitivityclassification)
150150
- [Set-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/set-azsqldatabasesensitivityclassification)
151151
- [Remove-AzSqlDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/remove-azsqldatabasesensitivityclassification)
152152
- [Get-AzSqlDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/get-azsqldatabasesensitivityrecommendation)
153153
- [Enable-AzSqlDatabaSesensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/enable-azsqldatabasesensitivityrecommendation)
154154
- [Disable-AzSqlDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/disable-azsqldatabasesensitivityrecommendation)
155155

156-
### PowerShell Cmdlets for Managed Instance
156+
#### PowerShell Cmdlets for Managed Instance
157157
- [Get-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/get-azsqlinstancedatabasesensitivityclassification)
158158
- [Set-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/set-azsqlinstancedatabasesensitivityclassification)
159159
- [Remove-AzSqlInstanceDatabaseSensitivityClassification](https://docs.microsoft.com/powershell/module/az.sql/remove-azsqlinstancedatabasesensitivityclassification)
160160
- [Get-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/get-azsqlinstancedatabasesensitivityrecommendation)
161161
- [Enable-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/enable-azsqlinstancedatabasesensitivityrecommendation)
162162
- [Disable-AzSqlInstanceDatabaseSensitivityRecommendation](https://docs.microsoft.com/powershell/module/az.sql/disable-azsqlinstancedatabasesensitivityrecommendation)
163163

164-
---
165164

166-
## <a id="subheading-6"></a>Next steps
165+
## <a id="next-steps"></a>Next steps
167166

168167
- Learn more about [Advanced Data Security](sql-database-advanced-data-security.md).
169168
- Consider configuring [Azure SQL Database Auditing](sql-database-auditing.md) for monitoring and auditing access to your classified sensitive data.
170-
- For a YouTube presentation that includes Data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
171-
172-
<!--Anchors-->
173-
[What is data discovery & classification]: #subheading-1
174-
[Discovering, classifying & labeling sensitive columns]: #subheading-2
175-
[Auditing access to sensitive data]: #subheading-3
176-
[Permissions]: #subheading-4
177-
[Manage classifications]: #subheading-5
178-
[Next Steps]: #subheading-6
169+
- For a presentation that includes Data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).

articles/sql-database/sql-database-security-best-practice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -730,7 +730,7 @@ Monitor who accesses sensitive data and capture queries on sensitive data in aud
730730
**How to implement**:
731731

732732
- Use SQL Audit and Data Classification in combination.
733-
- In your [SQL Database Audit](sql-database-auditing.md) log, you can track access specifically to sensitive data. You can also view information such as the data that was accessed, as well as its sensitivity label. For more information, see [Auditing access to sensitive data](sql-database-data-discovery-and-classification.md#subheading-3).
733+
- In your [SQL Database Audit](sql-database-auditing.md) log, you can track access specifically to sensitive data. You can also view information such as the data that was accessed, as well as its sensitivity label. For more information, see [Data Discovery & Classification](sql-database-data-discovery-and-classification.md) and [Auditing access to sensitive data](sql-database-data-discovery-and-classification.md#audit-sensitive-data).
734734

735735
**Best practices**:
736736

0 commit comments

Comments
 (0)