SQLBits 2022
Applying a Security Mindset to Lockdown Azure SQL Database
I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection.
Securing your database in the cloud is not an act but a mindset.
Securing a database is frustrating because how do you know when you are done? Meeting bare minimum of an auditor’s checklist is likely to leave gaps. The best option is to develop a security mindset and aim for building a multi-layered defense system approach.
In this talk, I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection and more.
By the end of this talk, you will have a plan in play to implement multi-layer defense as well as monitoring for Azure SQL.
feedback link: https://sqlb.it/?7075
Securing a database is frustrating because how do you know when you are done? Meeting bare minimum of an auditor’s checklist is likely to leave gaps. The best option is to develop a security mindset and aim for building a multi-layered defense system approach.
In this talk, I will show you demos for how to implement each layer of defense. This way, if one layer is breached, you aren’t left defenseless. We will start at the outer layer with network access. Next, we will cover the authentication and authorization using Azure RBAC. Finally, we will protect the innermost layer with Data At Rest and Data In Transit encryption. Once these protections are in place, we’ll see how to monitor Azure SQL security ecosystem for intrusions with Advanced threat protection and more.
By the end of this talk, you will have a plan in play to implement multi-layer defense as well as monitoring for Azure SQL.
feedback link: https://sqlb.it/?7075