Download presentation
Presentation is loading. Please wait.
Published byBeverley Collins Modified over 8 years ago
2
DBI401
5
Customer challenges Protect data-at-rest Transparent Data Encryption Data/Key separation Extensible Key Managements Use strong authentication Kerberos authentication enhancements Monitor all activity SQL Server Audit Detect non-compliant configurations Policy-Based Management Change Data Capture Industry Certification Common Criteria Certification (EAL4+) PROTECT DATA ENSURE COMPLIANCE CONTROL ACCESS
8
Default Schema for GroupsUser-Defined Server Roles
9
Group1 Default schema = schema1
10
CONTROL SERVER ALTER ANY LOGIN DBARole
11
demo
12
Audit supported on all SKUsImproved ResilienceUser-Defined Audit EventRecord FilteringT-SQL Stack Information
13
SQL Server Express
14
Select… Rollback
15
exec sp_audit_write 1234, 1, N‘Hello World’ @user_defined_event_id @succeeded @user_defined_info Audit Log
16
CREATE SERVER AUDIT audit_name TO { [ FILE ( [,...n ]) ] | APPLICATION_LOG | SECURITY_LOG } [ WITH ( [,...n ] ) ] [ FILTER = ] } … ::= { [ NOT ] | {( ) } [ { AND | OR } [ NOT ] { | ( ) } ] [,...n ] } Tightly constrain info written to Audit log ● Audit record generated but not written Leverages Xevent filtering
17
Audit Log hr.viewsalaryhr.viewsalary hr.payrollhr.payroll exec hr.viewsalary select salary from hr.payroll
18
demo
20
User=Alice; Pwd; IC=NormalDB Login User=Alice; Pwd; IC=CDB Contained User User=Alice; Pwd; IC=CDB Login (Contained user Alice exists) (Contained user Alice does not exist)
21
User=Domain\Alice; IC=NormalDB Login User=Domain\Alice; IC=CDB Login User=Domain\Alice; IC=CDB Contained User (Login Alice exists) (Login Alice does not exist)
22
demo
23
CREATE CERTIFICATE FROM BYTES4K certificates supported for importSMK/DMK default to AES256Key backups encrypted with AES256SHA2 (256 and 512) supportPassword hashes use SHA512RC4 deprecated
24
Required Slide Speakers, please list the Breakout Sessions, Interactive Discussions, Labs, Demo Stations and Certification Exam that relate to your session. Also indicate when they can find you staffing in the TLC.
25
SQL Server Database Security and Compliance portal Understanding SQL Server Audit Understanding Transparent Data Encryption Understanding Extensible Key Management SQL Server 2008 Security Security Enhancements Server Level Roles Designing and Implementing a Contained Database SQL Server “Denali” SQL Server Engine Security Blog SQL Server Security Forum Additional Resources
26
Required Slide Track PMs will supply the content for this slide, which will be inserted during the final scrub. Try the new SQL Server Mission Critical BareMetal Hand’s on-Labs Visit the updated website for SQL Server® Code Name “Denali” on www.microsoft.com/sqlserver and sign to be notified when the next CTP is available www.microsoft.com/sqlserver Follow the @SQLServer Twitter account to watch for updates Visit the SQL Server Product Demo Stations in the DBI Track section of the Expo/TLC Hall. Bring your questions, ideas and conversations! Microsoft® SQL Server® Security & ManagementMicrosoft® SQL Server® Optimization and Scalability Microsoft® SQL Server® ProgrammabilityMicrosoft® SQL Server® Data Warehousing Microsoft® SQL Server® Mission Critical Microsoft® SQL Server® Data Integration
27
Resources www.microsoft.com/teched Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn http://northamerica.msteched.com Connect. Share. Discuss.
29
Scan the Tag to evaluate this session now on myTechEd Mobile
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.