Securing SQL Server (eBook)
XIX, 165 Seiten
Apress (Verlag)
978-1-4842-2265-2 (ISBN)
- Covers the latest security technologies, including Always Encrypted, Dynamic Data Masking, and Row Level Security
- Promotes security best-practice and strategies for defense-in-depth of business-critical database assets
- Gives advice on performing threat analysis and reducing the attack surface that your database presents to the outside world
- Perform threat analysis
- Implement access level control and data encryption
- Avoid non-reputability by implementing comprehensive auditing
- Use security metadata to ensure your security policies are enforced
- Apply the latest SQL Server technologies to increase data security
- Mitigate the risk of credentials being stolen
Peter A Carter is a SQL Server expert, with over a decade of experience in developing, administering, and architecting SQL Server platforms and data-tier applications. Peter was awarded an MCC by Microsoft in 2011 to sit alongside his array of MCTS, MCITP, MCSA and MCSE certifications in SQL Server from version 2005 onwards. His passion for SQL Server shows through in everything he does, and his goal is that his passion for the technology will inspire others.
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. Database professionals in today's world deal increasingly often with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company's data secure. Securing SQL Server demonstrates how administrators and developers can both play their part in the protection of a SQL Server environment.This book provides a comprehensive technical guide to the security model, and to encryption within SQL Server, including coverage of the latest security technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security. Most importantly, the book gives practical advice and engaging examples on how to defend your data -- and ultimately your job! -- against attack and compromise.Covers the latest security technologies, including Always Encrypted, Dynamic Data Masking, and Row Level SecurityPromotes security best-practice and strategies for defense-in-depth of business-critical database assets Gives advice on performing threat analysis and reducing the attack surface that your database presents to the outside worldWhat You Will LearnPerform threat analysisImplement access level control and data encryptionAvoid non-reputability by implementing comprehensive auditingUse security metadata to ensure your security policies are enforcedApply the latest SQL Server technologies to increase data securityMitigate the risk of credentials being stolenWho This Book Is For SQL Server database administrators who need to understand and counteract the threat of attacks against their company's data. The book is also of interest to database administrators of other platforms, as several of the attack techniques are easily generalized beyond SQL Server and to other database brands.
Peter A Carter is a SQL Server expert, with over a decade of experience in developing, administering, and architecting SQL Server platforms and data-tier applications. Peter was awarded an MCC by Microsoft in 2011 to sit alongside his array of MCTS, MCITP, MCSA and MCSE certifications in SQL Server from version 2005 onwards. His passion for SQL Server shows through in everything he does, and his goal is that his passion for the technology will inspire others.
1. Threat Analysis2. SQL Server Security Model3. SQL Server Audit4. Data-Level Security5. Encryption in SQL Server 6. Security Metadata7. Implementing Service Accounts for Security8. Protecting Credentials9. Reducing the Attack Surface
Erscheint lt. Verlag | 21.10.2016 |
---|---|
Zusatzinfo | XIX, 165 p. 38 illus., 37 illus. in color. |
Verlagsort | Berkeley |
Sprache | englisch |
Themenwelt | Informatik ► Datenbanken ► SQL Server |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Schlagworte | Auditing • Countermeasures • credentials • Database Audit • data masking • Encryption • Hardening • Hardening the Database • Impersonation • Ownership Chaining • Public Key Certificates • Row-Level Security • Security auditing • Server Roles • threat analysis • Transparent Data Encryption |
ISBN-10 | 1-4842-2265-2 / 1484222652 |
ISBN-13 | 978-1-4842-2265-2 / 9781484222652 |
Haben Sie eine Frage zum Produkt? |
Größe: 6,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich