Skip to content

Commit f53c807

Browse files
committed
Add other dbs
1 parent 53e343b commit f53c807

File tree

6 files changed

+125
-22
lines changed

6 files changed

+125
-22
lines changed

articles/mariadb/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,16 +49,18 @@
4949
href: concepts-limits.md
5050
- name: Data access & security
5151
items:
52-
- name: Firewall rules
53-
href: concepts-firewall-rules.md
52+
- name: Security overview
53+
href: concepts-security.md
5454
- name: Configuring SSL
5555
href: concepts-ssl-connection-security.md
56-
- name: Advanced Threat Protection
57-
href: concepts-data-access-and-security-threat-protection.md
58-
- name: Virtual Network
59-
href: concepts-data-access-security-vnet.md
6056
- name: Connectivity architecture
6157
href: concepts-connectivity-architecture.md
58+
- name: Firewall rules
59+
href: concepts-firewall-rules.md
60+
- name: Virtual Network
61+
href: concepts-data-access-security-vnet.md
62+
- name: Advanced Threat Protection
63+
href: concepts-data-access-and-security-threat-protection.md
6264
- name: Business continuity
6365
items:
6466
- name: Business continuity intro

articles/mariadb/concepts-security.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Security in Azure Database for MariaDB - Single Server
3+
description: An overview of the security features in Azure Database for MariaDB - Single Server.
4+
author: ajlam
5+
ms.author: andrela
6+
ms.service: mariadb
7+
ms.topic: conceptual
8+
ms.date: 11/22/2019
9+
---
10+
11+
# Security in Azure Database for MariaDB - Single Server
12+
13+
There are multiple layers of security that are available to protect the data on your Azure Database for MariaDB server. This article outlines those security options.
14+
15+
## Information protection and encryption
16+
17+
### In-transit
18+
Azure Database for MariaDB secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default.
19+
20+
### At-rest
21+
The Azure Database for MariaDB service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.
22+
23+
24+
## Network security
25+
Connections to an Azure Database for MariaDB server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
26+
27+
A newly created Azure Database for MariaDB server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
28+
29+
### IP firewall rules
30+
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
31+
32+
### Virtual network firewall rules
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for MariaDB server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-security-vnet.md).
34+
35+
36+
## Access management
37+
38+
While creating the Azure Database for MariaDB server, you provide credentials for an administrator user. This administrator can be used to create additional MariaDB users.
39+
40+
41+
## Threat protection
42+
43+
You can opt in to [Advanced Threat Protection](concepts-data-access-and-security-threat-protection.md) which detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit servers.
44+
45+
[Audit logging](concepts-audit-logs.md) is available to track activity in your databases.
46+
47+
48+
## Next steps
49+
- Enable firewall rules for [IPs](concepts-firewall-rules.md) or [virtual networks](concepts-data-access-and-security-vnet.md)

articles/mysql/TOC.yml

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,16 +79,18 @@
7979
href: concepts-limits.md
8080
- name: Data access & security
8181
items:
82-
- name: Firewall rules
83-
href: concepts-firewall-rules.md
82+
- name: Security overview
83+
href: concepts-security.md
8484
- name: Configuring SSL
8585
href: concepts-ssl-connection-security.md
86-
- name: Advanced Threat Protection
87-
href: concepts-data-access-and-security-threat-protection.md
88-
- name: Virtual Network
89-
href: concepts-data-access-and-security-vnet.md
9086
- name: Connectivity architecture
91-
href: concepts-connectivity-architecture.md
87+
href: concepts-connectivity-architecture.md
88+
- name: Firewall rules
89+
href: concepts-firewall-rules.md
90+
- name: Virtual Network
91+
href: concepts-data-access-security-vnet.md
92+
- name: Advanced Threat Protection
93+
href: concepts-data-access-and-security-threat-protection.md
9294
- name: Business continuity
9395
items:
9496
- name: Business continuity intro

articles/mysql/concepts-security.md

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
title: Security in Azure Database for MySQL - Single Server
3+
description: An overview of the security features in Azure Database for MySQL - Single Server.
4+
author: ajlam
5+
ms.author: andrela
6+
ms.service: mysql
7+
ms.topic: conceptual
8+
ms.date: 11/22/2019
9+
---
10+
11+
# Security in Azure Database for MySQL - Single Server
12+
13+
There are multiple layers of security that are available to protect the data on your Azure Database for MySQL server. This article outlines those security options.
14+
15+
## Information protection and encryption
16+
17+
### In-transit
18+
Azure Database for MySQL secures your data by encrypting data in-transit with Transport Layer Security. Encryption (SSL/TLS) is enforced by default.
19+
20+
### At-rest
21+
The Azure Database for MySQL service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and can't be disabled.
22+
23+
24+
## Network security
25+
Connections to an Azure Database for MySQL server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
26+
27+
A newly created Azure Database for MySQL server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
28+
29+
### IP firewall rules
30+
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
31+
32+
### Virtual network firewall rules
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for MySQL server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-security-vnet.md).
34+
35+
36+
## Access management
37+
38+
While creating the Azure Database for MySQL server, you provide credentials for an administrator user. This administrator can be used to create additional MySQL users.
39+
40+
41+
## Threat protection
42+
43+
You can opt in to [Advanced Threat Protection](concepts-data-access-and-security-threat-protection.md) which detects anomalous activities indicating unusual and potentially harmful attempts to access or exploit servers.
44+
45+
[Audit logging](concepts-audit-logs.md) is available to track activity in your databases.
46+
47+
48+
## Next steps
49+
- Enable firewall rules for [IPs](concepts-firewall-rules.md) or [virtual networks](concepts-data-access-and-security-vnet.md)

articles/postgresql/concepts-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rachel-msft
55
ms.author: raagyema
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 11/20/2019
8+
ms.date: 11/22/2019
99
---
1010

1111
# Security in Azure Database for PostgreSQL - Single Server
@@ -24,13 +24,13 @@ The Azure Database for PostgreSQL service uses the FIPS 140-2 validated cryptogr
2424
## Network security
2525
Connections to an Azure Database for PostgreSQL server are first routed through a regional gateway. The gateway has a publicly accessible IP, while the server IP addresses are protected. For more information about the gateway, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
2626

27-
A new Azure Database for PostgreSQL server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
27+
A newly created Azure Database for PostgreSQL server has a firewall that blocks all external connections. Though they reach the gateway, they are not allowed to connect to the server.
2828

2929
### IP firewall rules
3030
IP firewall rules grant access to servers based on the originating IP address of each request. See the [firewall rules overview](concepts-firewall-rules.md) for more information.
3131

3232
### Virtual network firewall rules
33-
Using virtual network service endpoints, you can enable your Azure Database for PostgreSQL server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-and-security-vnet.md).
33+
Virtual network service endpoints extend your virtual network connectivity over the Azure backbone. Using virtual network rules you can enable your Azure Database for PostgreSQL server to allow connections from selected subnets in a virtual network. For more information, see the [virtual network service endpoint overview](concepts-data-access-and-security-vnet.md).
3434

3535

3636
## Access management

articles/postgresql/overview.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,21 +6,22 @@ ms.author: jonels
66
ms.custom: mvc
77
ms.service: postgresql
88
ms.topic: overview
9-
ms.date: 05/06/2019
9+
ms.date: 11/21/2019
1010
---
1111
# What is Azure Database for PostgreSQL?
1212
Azure Database for PostgreSQL is a relational database service in the Microsoft cloud built for developers. It is based on the community version of open-source [PostgreSQL](https://www.postgresql.org/) database engine, and is available in two deployment options: Single Server and Hyperscale (Citus).
1313

1414
## Azure Database for PostgreSQL - Single Server
1515
The Single Server deployment option delivers:
1616

17-
- Built-in high availability with no additional cost (99.99% SLA)
17+
- Built-in [high availability](concepts-high-availability.md) with no additional cost (99.99% SLA)
1818
- Predictable performance, using inclusive pay-as-you-go pricing
19-
- Vertical scale as needed within seconds
20-
- Monitoring and alerting to quickly assess the impact of scaling
21-
- Secured to protect sensitive data at-rest and in-motion
22-
- Automatic backups and point-in-time-restore for up to 35 days
19+
- [Vertical scale as needed](concepts-pricing-tiers.md) within seconds
20+
- [Monitoring and alerting](concepts-monitoring.md) to assess your server
2321
- Enterprise-grade security and compliance
22+
- [Secured to protect](concepts-security.md) sensitive data at-rest and in-motion
23+
- [Automatic backups and point-in-time-restore](concepts-business-continuity.md) for up to 35 days
24+
2425

2526
All those capabilities require almost no administration, and all are provided at no additional cost. They allow you to focus on rapid application development and accelerating your time to market, rather than spending precious time and resources to manage virtual machines and infrastructure. You can continue to develop your application with the open-source tools and platform of your choice, without having to learn new skills.
2627

0 commit comments

Comments
 (0)