Skip to content

Commit 966fb0d

Browse files
authored
Update concepts-security.md
1 parent 77a0427 commit 966fb0d

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/postgresql/flexible-server/concepts-security.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,15 +51,15 @@ When you enable this plan, Defender for Cloud will provide alerts when it detect
5151

5252
These alerts appear in Defender for Cloud's security alerts page and include:
5353

54-
* details of the suspicious activity that triggered them
55-
* the associated MITRE ATT&CK tactic
56-
* recommended actions for how to investigate and mitigate the threat
57-
* options for continuing your investigations with Microsoft Sentinel
54+
* Details of the suspicious activity that triggered them
55+
* The associated MITRE ATT&CK tactic
56+
* Recommended actions for how to investigate and mitigate the threat
57+
* Options for continuing your investigations with Microsoft Sentinel
5858

5959
> [!NOTE]
6060
> Microsoft Defender for Azure Database for PostgreSQL - Flexible Server currently has following limitations:
61-
> 1. No Azure CLI or PowerShell support.
62-
> 2. No ability to enable Cloud Defender for Azure Database for PostgreSQL - Flexible Server on subscription level.
61+
> - No Azure CLI or PowerShell support.
62+
> - No ability to enable Cloud Defender for Azure Database for PostgreSQL - Flexible Server on subscription level.
6363
6464
### Microsoft Defender for Cloud and Brute Force Attacks
6565

@@ -72,7 +72,7 @@ To get alerts from the Microsoft Defender plan you'll first need to **enable it*
7272
2. Pick Microsoft Defender for Cloud
7373
4. Click Enable in the right pane.
7474

75-
:::image type="content" source="./media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure Portal showing how to enable Cloud Defender.":::
75+
:::image type="content" source="./media/concepts-security/defender-for-cloud-azure-portal-postgresql.png" alt-text="Screenshot of Azure portal showing how to enable Cloud Defender.":::
7676

7777

7878
## Access management
@@ -177,7 +177,7 @@ In this example, user *user1* can connect and has all privileges in our test dat
177177

178178
## Row level security
179179

180-
[Row level security (RLS)](https://www.postgresql.org/docs/current/ddl-rowsecurity.html) is a PostgreSQL security feature that allows database administrators to define policies to control how specific rows of data display and operate for one or more roles. Row level security is an additional filter you can apply to a PostgreSQL database table. When a user tries to perform an action on a table, this filter is applied before the query criteria or other filtering, and the data is narrowed or rejected according to your security policy. You can create row level security policies for specific commands like *SELECT*, *INSERT*, *UPDATE*, and *DELETE*, specify it for ALL commands. Use cases for row level security include PCI compliant implementations, classified environments, as well as shared hosting / multi-tenant applications.
180+
[Row level security (RLS)](https://www.postgresql.org/docs/current/ddl-rowsecurity.html) is a PostgreSQL security feature that allows database administrators to define policies to control how specific rows of data display and operate for one or more roles. Row level security is an additional filter you can apply to a PostgreSQL database table. When a user tries to perform an action on a table, this filter is applied before the query criteria or other filtering, and the data is narrowed or rejected according to your security policy. You can create row level security policies for specific commands like *SELECT*, *INSERT*, *UPDATE*, and *DELETE*, specify it for ALL commands. Use cases for row level security include PCI compliant implementations, classified environments, as well as shared hosting / multitenant applications.
181181
Only users with `SET ROW SECURITY` rights may apply row security rights to a table. The table owner may set row security on a table. Like `OVERRIDE ROW SECURITY` this is currently an implicit right. Row-level security does not override existing *GRANT* permissions, it adds a finer grained level of control. For example, setting `ROW SECURITY FOR SELECT` to allow a given user to give rows would only give that user access if the user also has *SELECT* privileges on the column or table in question.
182182

183183
Here is an example showing how to create a policy that ensures only members of the custom created *“manager”* [role](#access-management) can access only the rows for a specific account. The code in below example was shared in the [PostgreSQL documentation](https://www.postgresql.org/docs/current/ddl-rowsecurity.html).

0 commit comments

Comments
 (0)