Skip to content

Commit e516a7a

Browse files
committed
links
1 parent 5f05c67 commit e516a7a

File tree

3 files changed

+13
-13
lines changed

3 files changed

+13
-13
lines changed

articles/security/fundamentals/database-security-checklist.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,20 +24,20 @@ To help improve security, Azure Database includes a number of built-in security
2424

2525
These include:
2626

27-
- A firewall that enables you to create [firewall rules](../../sql-database/sql-database-firewall-configure.md) limiting connectivity by IP address,
28-
- Server-level firewall accessible from the Azure portal
29-
- Database-level firewall rules accessible from SSMS
30-
- Secure connectivity to your database using secure connection strings
31-
- Use access management
32-
- Data encryption
33-
- SQL Database auditing
34-
- SQL Database threat detection
27+
- A firewall that enables you to create [firewall rules](../../sql-database/sql-database-firewall-configure.md) limiting connectivity by IP address,
28+
- Server-level firewall accessible from the Azure portal
29+
- Database-level firewall rules accessible from SSMS
30+
- Secure connectivity to your database using secure connection strings
31+
- Use access management
32+
- Data encryption
33+
- SQL Database auditing
34+
- SQL Database threat detection
3535

3636
## Introduction
3737
Cloud computing requires new security paradigms that are unfamiliar to many application users, database administrators, and programmers. As a result, some organizations are hesitant to implement a cloud infrastructure for data management due to perceived security risks. However, much of this concern can be alleviated through a better understanding of the security features built into Microsoft Azure and Microsoft Azure SQL Database.
3838

3939
## Checklist
40-
We recommend that you read the [Azure Database Security Best Practices](database-best-practices.md) article prior to reviewing this checklist. You will be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that youve addressed the important issues in Azure database security.
40+
We recommend that you read the [Azure Database Security Best Practices](database-best-practices.md) article prior to reviewing this checklist. You will be able to get the most out of this checklist after you understand the best practices. You can then use this checklist to make sure that you've addressed the important issues in Azure database security.
4141

4242

4343
|Checklist Category| Description|
@@ -46,11 +46,11 @@ We recommend that you read the [Azure Database Security Best Practices](database
4646
| <br> Encryption in Motion/Transit| <ul><li>[Transport Layer Security](https://docs.microsoft.com/windows-server/security/tls/transport-layer-security-protocol), for data encryption when data is moving to the networks.</li><li>Database requires secure communication from clients based on the [TDS(Tabular Data Stream)](https://msdn.microsoft.com/library/dd357628.aspx) protocol over TLS (Transport Layer Security).</li></ul> |
4747
|<br>Encryption at rest| <ul><li>[Transparent Data Encryption](https://go.microsoft.com/fwlink/?LinkId=526242), when inactive data is stored physically in any digital form.</li></ul>|
4848
|**Control Access**||
49-
|<br> Database Access | <ul><li>[Authentication](../../sql-database/sql-database-control-access.md) (Azure Active Directory Authentication) AD authentication uses identities managed by Azure Active Directory.</li><li>[Authorization](../../sql-database/sql-database-control-access.md) grant users the least privileges necessary.</li></ul> |
49+
|<br> Database Access | <ul><li>[Authentication](../../sql-database/sql-database-manage-logins.md) (Azure Active Directory Authentication) AD authentication uses identities managed by Azure Active Directory.</li><li>[Authorization](../../sql-database/sql-database-manage-logins.md) grant users the least privileges necessary.</li></ul> |
5050
|<br>Application Access| <ul><li>[Row level Security](https://msdn.microsoft.com/library/dn765131) (Using Security Policy, at the same time restricting row-level access based on a user's identity,role, or execution context).</li><li>[Dynamic Data Masking](../../sql-database/sql-database-dynamic-data-masking-get-started.md) (Using Permission & Policy, limits sensitive data exposure by masking it to non-privileged users)</li></ul>|
5151
|**Proactive Monitoring**||
5252
| <br>Tracking & Detecting| <ul><li>[Auditing](../../sql-database/sql-database-auditing.md) tracks database events and writes them to an Audit log/ Activity log in your [Azure Storage account](../../storage/common/storage-create-storage-account.md).</li><li>Track Azure Database health using [Azure Monitor Activity Logs](../../azure-monitor/platform/platform-logs-overview.md).</li><li>[Threat Detection](../../sql-database/sql-database-threat-detection.md) detects anomalous database activities indicating potential security threats to the database. </li></ul> |
53-
|<br>Azure Security Center| <ul><li>[Data Monitoring](../../security-center/security-center-enable-auditing-on-sql-databases.md) Use Azure Security Center as a centralized security monitoring solution for SQL and other Azure services.</li></ul>|
53+
|<br>Azure Security Center| <ul><li>[Data Monitoring](../../security-center/security-center-enable-auditing-on-sql-databases.md) Use Azure Security Center as a centralized security monitoring solution for SQL and other Azure services.</li></ul>|
5454

5555
## Conclusion
5656
Azure Database is a robust database platform, with a full range of security features that meet many organizational and regulatory compliance requirements. You can easily protect data by controlling the physical access to your data, and using a variety of options for data security at the file-, column-, or row-level with Transparent Data Encryption, Cell-Level Encryption, or Row-Level Security. Always Encrypted also enables operations against encrypted data, simplifying the process of application updates. In turn, access to auditing logs of SQL Database activity provides you with the information you need, allowing you to know how and when data is accessed.

articles/security/fundamentals/paas-applications-using-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ SQL Database default source IP address restrictions allow access from any Azure
6464

6565
To learn more about Azure SQL Firewall and IP restrictions, see:
6666

67-
- [Azure SQL Database and SQL Data Warehouse access control](../../sql-database/sql-database-control-access.md)
67+
- [Azure SQL Database and SQL Data Warehouse access control](../../sql-database/sql-database-manage-logins.md)
6868
- [Azure SQL Database and SQL Data Warehouse firewall rules](../../sql-database/sql-database-firewall-configure.md)
6969

7070

articles/sql-data-warehouse/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@
9494
- name: Access control
9595
items:
9696
- name: Overview
97-
href: ../sql-database/sql-database-control-access.md?toc=/azure/sql-data-warehouse/toc.json&bc=/azure/sql-data-warehouse/breadcrumb/toc.json
97+
href: ../sql-database/sql-database-manage-logins.md?toc=/azure/sql-data-warehouse/toc.json&bc=/azure/sql-data-warehouse/breadcrumb/toc.json
9898
- name: Column-level security
9999
href: column-level-security.md
100100
- name: Row-level security

0 commit comments

Comments
 (0)