You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-security.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,15 +51,15 @@ When you enable this plan, Defender for Cloud will provide alerts when it detect
51
51
52
52
These alerts appear in Defender for Cloud's security alerts page and include:
53
53
54
-
*details of the suspicious activity that triggered them
55
-
*the associated MITRE ATT&CK tactic
56
-
*recommended actions for how to investigate and mitigate the threat
57
-
*options for continuing your investigations with Microsoft Sentinel
54
+
*Details of the suspicious activity that triggered them
55
+
*The associated MITRE ATT&CK tactic
56
+
*Recommended actions for how to investigate and mitigate the threat
57
+
*Options for continuing your investigations with Microsoft Sentinel
58
58
59
59
> [!NOTE]
60
60
> Microsoft Defender for Azure Database for PostgreSQL - Flexible Server currently has following limitations:
61
-
> 1. No Azure CLI or PowerShell support.
62
-
> 2. No ability to enable Cloud Defender for Azure Database for PostgreSQL - Flexible Server on subscription level.
61
+
> - No Azure CLI or PowerShell support.
62
+
> - No ability to enable Cloud Defender for Azure Database for PostgreSQL - Flexible Server on subscription level.
63
63
64
64
### Microsoft Defender for Cloud and Brute Force Attacks
65
65
@@ -72,7 +72,7 @@ To get alerts from the Microsoft Defender plan you'll first need to **enable it*
72
72
2. Pick Microsoft Defender for Cloud
73
73
4. Click Enable in the right pane.
74
74
75
-
:::image type="content" source="./media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure Portal showing how to enable Cloud Defender.":::
75
+
:::image type="content" source="./media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure portal showing how to enable Cloud Defender.":::
76
76
77
77
78
78
## Access management
@@ -177,7 +177,7 @@ In this example, user *user1* can connect and has all privileges in our test dat
177
177
178
178
## Row level security
179
179
180
-
[Row level security (RLS)](https://www.postgresql.org/docs/current/ddl-rowsecurity.html) is a PostgreSQL security feature that allows database administrators to define policies to control how specific rows of data display and operate for one or more roles. Row level security is an additional filter you can apply to a PostgreSQL database table. When a user tries to perform an action on a table, this filter is applied before the query criteria or other filtering, and the data is narrowed or rejected according to your security policy. You can create row level security policies for specific commands like *SELECT*, *INSERT*, *UPDATE*, and *DELETE*, specify it for ALL commands. Use cases for row level security include PCI compliant implementations, classified environments, as well as shared hosting / multi-tenant applications.
180
+
[Row level security (RLS)](https://www.postgresql.org/docs/current/ddl-rowsecurity.html) is a PostgreSQL security feature that allows database administrators to define policies to control how specific rows of data display and operate for one or more roles. Row level security is an additional filter you can apply to a PostgreSQL database table. When a user tries to perform an action on a table, this filter is applied before the query criteria or other filtering, and the data is narrowed or rejected according to your security policy. You can create row level security policies for specific commands like *SELECT*, *INSERT*, *UPDATE*, and *DELETE*, specify it for ALL commands. Use cases for row level security include PCI compliant implementations, classified environments, as well as shared hosting / multitenant applications.
181
181
Only users with `SET ROW SECURITY` rights may apply row security rights to a table. The table owner may set row security on a table. Like `OVERRIDE ROW SECURITY` this is currently an implicit right. Row-level security does not override existing *GRANT* permissions, it adds a finer grained level of control. For example, setting `ROW SECURITY FOR SELECT` to allow a given user to give rows would only give that user access if the user also has *SELECT* privileges on the column or table in question.
182
182
183
183
Here is an example showing how to create a policy that ensures only members of the custom created *“manager”*[role](#access-management) can access only the rows for a specific account. The code in below example was shared in the [PostgreSQL documentation](https://www.postgresql.org/docs/current/ddl-rowsecurity.html).
0 commit comments