You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-data-discovery-and-classification.md
+18-27Lines changed: 18 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ tags: azure-synapse
18
18
19
19
Data Discovery & Classification provides advanced capabilities built into Azure SQL Database for **discovering**, **classifying**, **labeling** & **reporting** the sensitive data in your databases.
20
20
21
-
Discovering and classifying your most sensitive data (business, financial, healthcare, personally identifiable data (PII), and so on.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
21
+
Discovering and classifying your most sensitive data (business, financial, healthcare, personally identifiable data, and so on.) can play a pivotal role in your organizational information protection stature. It can serve as infrastructure for:
22
22
23
23
- Helping meet data privacy standards and regulatory compliance requirements.
24
24
- Various security scenarios, such as monitoring (auditing) and alerting on anomalous access to sensitive data.
@@ -29,7 +29,7 @@ Data Discovery & Classification is part of the [Advanced Data Security](sql-data
29
29
> [!NOTE]
30
30
> This document relates to Azure SQL Database and Azure Synapse. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse. For SQL Server (on premises), see [SQL Data Discovery and Classification](https://go.microsoft.com/fwlink/?linkid=866999).
31
31
32
-
## <aid="subheading-1"></a>What is data discovery & classification
32
+
## <aid="what-is-dc"></a>What is data discovery & classification
33
33
34
34
Data Discovery & Classification introduces a set of advanced services and new SQL capabilities, forming a new SQL Information Protection paradigm aimed at protecting the data, not just the database:
35
35
@@ -49,23 +49,23 @@ Data Discovery & Classification introduces a set of advanced services and new SQ
49
49
50
50
The database classification state can be viewed in a detailed dashboard in the portal. Additionally, you can download a report (in Excel format) to be used for compliance & auditing purposes, as well as other needs.
The following section describes the steps for discovering, classifying, and labeling columns containing sensitive data in your database, as well as viewing the current classification state of your database and exporting reports.
55
55
56
56
The classification includes two metadata attributes:
57
57
58
-
- Labels – The main classification attributes, used to define the sensitivity level of the data stored in the column.
59
-
- Information Types – Provide additional granularity into the type of data stored in the column.
58
+
-**Labels** – The main classification attributes, used to define the sensitivity level of the data stored in the column.
59
+
-**Information Types** – Provide additional granularity into the type of data stored in the column.
60
60
61
61
## Define and customize your classification taxonomy
62
62
63
63
Data Discovery & Classification comes with a built-in set of sensitivity labels and a built-in set of information types and discovery logic. You now have the ability to customize this taxonomy and define a set and ranking of classification constructs specifically for your environment.
64
64
65
65
Definition and customization of your classification taxonomy is done in one central place for your entire Azure tenant. That location is in [Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-intro), as part of your Security Policy. Only someone with administrative rights on the Tenant root management group can perform this task.
66
66
67
-
As part of the Information Protection policy management, you can define custom labels, rank them, and associate them with a selected set of information types. You can also add your own custom information types and configure them with string patterns, which are added to the discovery logic for identifying this type of data in your databases.
68
-
Learn more about customizing and managing your policy in the [Information Protection policy how-to guide](https://go.microsoft.com/fwlink/?linkid=2009845&clcid=0x409).
67
+
As part of the SQL Information Protection policy management, you can define custom labels, rank them, and associate them with a selected set of information types. You can also add your own custom information types and configure them with string patterns, which are added to the discovery logic for identifying this type of data in your databases.
68
+
Learn more about customizing and managing your policy in the [SQL Information Protection policy how-to guide](https://go.microsoft.com/fwlink/?linkid=2009845&clcid=0x409).
69
69
70
70
Once the tenant-wide policy has been defined, you can continue with the classification of individual databases using your customized policy.
71
71
@@ -105,23 +105,23 @@ Once the tenant-wide policy has been defined, you can continue with the classifi
105
105
106
106
8. To complete your classification and persistently label (tag) the database columns with the new classification metadata, click on **Save** in the top menu of the window.
107
107
108
-
## <aid="subheading-3"></a>Auditing access to sensitive data
108
+
## <aid="audit-sensitive-data"></a>Auditing access to sensitive data
109
109
110
110
An important aspect of the information protection paradigm is the ability to monitor access to sensitive data. [Azure SQL Database Auditing](sql-database-auditing.md) has been enhanced to include a new field in the audit log called *data_sensitivity_information*, which logs the sensitivity classifications (labels) of the actual data that was returned by the query.
The following built-in roles can read the data classification of an Azure SQL database: `Owner`, `Reader`, `Contributor`, `SQL Security Manager` and `User Access Administrator`.
117
117
118
118
The following built-in roles can modify the data classification of an Azure SQL database: `Owner`, `Contributor`, `SQL Security Manager`.
119
119
120
120
Learn more about [RBAC for Azure resources](https://docs.microsoft.com/azure/role-based-access-control/overview)
You can use T-SQL to add/remove column classifications, as well as retrieve all classifications for the entire database.
126
126
127
127
> [!NOTE]
@@ -131,8 +131,8 @@ You can use T-SQL to add/remove column classifications, as well as retrieve all
131
131
- Remove the classification from one or more columns: [DROP SENSITIVITY CLASSIFICATION](https://docs.microsoft.com/sql/t-sql/statements/drop-sensitivity-classification-transact-sql)
132
132
- View all classifications on the database: [sys.sensitivity_classifications](https://docs.microsoft.com/sql/relational-databases/system-catalog-views/sys-sensitivity-classifications-transact-sql)
133
133
134
-
#[Rest APIs](#tab/azure-rest-api)
135
-
You can use REST APIs to programmatically manage classifications and recommendations. The published REST APIs support the following operations:
134
+
### Using Rest API
135
+
You can use REST API to programmatically manage classifications and recommendations. The published REST API support the following operations:
136
136
137
137
-[Create Or Update](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/createorupdate) - Creates or updates the sensitivity label of a given column
138
138
-[Delete](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/delete) - Deletes the sensitivity label of a given column
@@ -142,37 +142,28 @@ You can use REST APIs to programmatically manage classifications and recommendat
142
142
-[List Current By Database](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/listcurrentbydatabase) - Gets the current sensitivity labels of a given database
143
143
-[List Recommended By Database](https://docs.microsoft.com/rest/api/sql/sensitivitylabels/listrecommendedbydatabase) - Gets the recommended sensitivity labels of a given database
144
144
145
-
#[PowerShell Cmdlet](#tab/azure-powelshell)
145
+
### Using PowerShell Cmdlet
146
146
You can use PowerShell to manage classifications and recommendations for Azure SQL Database and Managed Instance.
- Learn more about [Advanced Data Security](sql-database-advanced-data-security.md).
169
168
- Consider configuring [Azure SQL Database Auditing](sql-database-auditing.md) for monitoring and auditing access to your classified sensitive data.
170
-
- For a YouTube presentation that includes Data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
171
-
172
-
<!--Anchors-->
173
-
[What is data discovery & classification]: #subheading-1
[Auditing access to sensitive data]: #subheading-3
176
-
[Permissions]: #subheading-4
177
-
[Manage classifications]: #subheading-5
178
-
[Next Steps]: #subheading-6
169
+
- For a presentation that includes Data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-security-best-practice.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -730,7 +730,7 @@ Monitor who accesses sensitive data and capture queries on sensitive data in aud
730
730
**How to implement**:
731
731
732
732
- Use SQL Audit and Data Classification in combination.
733
-
- In your [SQL Database Audit](sql-database-auditing.md) log, you can track access specifically to sensitive data. You can also view information such as the data that was accessed, as well as its sensitivity label. For more information, see [Auditing access to sensitive data](sql-database-data-discovery-and-classification.md#subheading-3).
733
+
- In your [SQL Database Audit](sql-database-auditing.md) log, you can track access specifically to sensitive data. You can also view information such as the data that was accessed, as well as its sensitivity label. For more information, see [Data Discovery & Classification](sql-database-data-discovery-and-classification.md) and [Auditing access to sensitive data](sql-database-data-discovery-and-classification.md#audit-sensitive-data).
0 commit comments