SlideShare a Scribd company logo
Modern Data Security for the Enterprises
– SQL Server & Azure SQL Database
Notes:
 If you experience audio issues during the webinar, you can dial in through telephone details provided to you in
your registration confirmation email.
 Please feel free to post questions in the questions dialog & we will try to answer as many as we can at the end.
 Recording of this session will be shared in next 24-48 hours.
 You can also write to us at marketing@winwire.com for any clarifications or information.
Session Speaker
Sergei Kolpakov
Sr. Principal Consultant
Siddhartha Gaur
Technical Architect
Agenda
2. Modern Approach - Technology + Processes
3. Demo
4. Q&A
1. Data Security Threats
Data Security
2016 saw some of the largest data breaches ever, and while companies continue to fight the good
fight against hackers and identity theft, Data Security has been one of the major concern for
organizations across the globe.
What are data security threats?
OutsiderInsider
Data Security – How to ensure?
Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites. Data security also protects data from
corruption. Data security is an essential aspect of IT for organizations of every size and type.
Data security is also known as information security (IS)
• Obfuscating Data using
key-based cryptography,
or obscuring data with
alternate text.
• Ensure data is only legible
to the intended audience
Data Encryption
• Management of Logins and
Roles to restrict access of
data
• Prevent unauthorized
persons from obtaining
sensitive information
Access Control
• Detailed logging of failed
authentication attempts for
use in access auditing, as well
as raise alerts on anomalous
activity which may indicate a
security threat
Proactive Monitoring
Enterprise Data Security
Protect your organization, data and people
Access Control
Authorization – What all could you do?
Identification – Are you allowed?
Authentication – Who are you?
Access Control - Firewall
 Protects network and its resources from malicious
external users
 Secure confidential information from those who do
not have “explicit” access to it
 Firewall settings enable administrators to determine
conditions for which a connection to the server
instance is allowed
 Windows authentication in SQL Server provides
centralized access control with Active Directory
 SSL/TLS secures connections to SQL Server
Access Control - Active Directory Authentication
 Secure access to on-premises and cloud applications,
including Microsoft online services like Office 365 and
many non-Microsoft SaaS applications
 Extend to Azure Active Directory on cloud for
simplified user access
 User attributes along with roles and access
permissions are automatically synchronized to cloud
directory
 Every organization resource request is validated to
ensures only authenticated users connects to that
resource
 Avoid using SQL Authentication
Access Control - Separation of Roles
 Not every authenticated user should access everything. Only
authorized users should get access to any resource/data
 Role-based access control (RBAC) is an approach to
restricting system access to authorized users.
 Permissions are associated with roles, and users are assigned
to appropriate roles
 Roles are created for the various job functions in an
organization and users are assigned roles based on their
responsibilities and qualifications
 Users can be easily reassigned from one role to another
Access Control - Permission
 Granular access permissions for the organization's
repositories
 Admin must ensure that minimum required permissions are
given to any role/user to allow it complete the required tasks.
No less and No More
 Read, Write and Execute - Ensure right user have right set of
permissions, to avoid any malicious or accidental threat to
data security
 Regular audit of permissions must be done
Read
ExecuteWrite
Access Control - Row-Level Security
 RLS enables storing data for many users in a single
database and table while ensuring user sees only
her/his data
 Access is restricted to row-level, and based on a
user's identity, role, and/ or execution context
 Access logic is centralized
 Reduced risk of error in application code
Row-Level Security
• Fine-grained access control
• Application Transparency
• Centralized security logic
Access Control - Row-Level Security
How to implement RLS
Demo
Row-Level Security
Access Control - Dynamic Data Masking
 Protects against unauthorized disclosure of
sensitive data in the application
 Protect personally identifiable information
 Regulatory Compliance
 Expose sensitive data only on a need-to-know
basis
 In absence of this typically Custom obfuscation
in application, views or third party solutions are
used to address this need
Demo
Dynamic Data Masking
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
Encryption - Transparent Data Encryption (TDE)
Protects sensitive data stored in a SQL Database
from unauthorized access
Encryption – T-SQL vs Azure to Setup TDE Certificate
USE master;
GO
CREATE MASTER KEY ENCRYPTION BY PASSWORD = ‘sw9*K!j^*8u77*sso&#7*sso';
go
CREATE CERTIFICATE MyServerCert WITH SUBJECT = 'My DEK Certificate';
go
USE MyDb;
GO
CREATE DATABASE ENCRYPTION KEY
WITH ALGORITHM = AES_128
ENCRYPTION BY SERVER CERTIFICATE MyServerCert;
GO
ALTER DATABASE MyDb
SET ENCRYPTION ON;
GO
BACKUP CERTIFICATE MyServerCert TO FILE = 'C:Program FilesMicrosoft SQL
ServerMSSQL13.MSSQLSERVERMSSQLBackupMyDEKCertificate'
WITH PRIVATE KEY (FILE = 'C:Program FilesMicrosoft SQL
ServerMSSQL13.MSSQLSERVERMSSQLBackupMyDEKKey',
ENCRYPTION BY PASSWORD = '@1Qswkmswojd3i*nn77^7778Y34%#')
GO
Data disclosure
prevention
Client-side encryption of
sensitive data using keys that
are never given to the
database system
Queries on
encrypted data
Support for equality
comparison, including join,
group by, and distinct
operators
Application
transparency
Minimal application changes
via server and client library
enhancements
Allows customers to securely store sensitive data outside of their trust boundary.
Data remains protected from high-privileged, yet unauthorized, users.
Security
Encryption – The need for Always Encrypted
Encryption – How it Works
Help protect data at rest and in motion, on-premises & cloud
SQL Server or SQL Database
ADO .NET
Name
Wayne Jefferson
Name
0x19ca706fbd9a
Result SetResult Set
Client
Name SSN Country
0x19ca706fbd9a 0x7ff654ae6d USA
dbo.Customers
ciphertext
"SELECT Name FROM Customers WHERE SSN = @SSN",
0x7ff654ae6d
ciphertext
"SELECT Name FROM Customers WHERE SSN =
@SSN",
"111-22-3333"
Encrypted sensitive data and corresponding keys
are never seen in plaintext in SQL Server
trust boundary
Randomized encryption
Encrypt('123-45-6789') = 0x17cfd50a
Repeat: Encrypt('123-45-6789') = 0x9b1fcf32
Allows for transparent retrieval of encrypted data but NO
operations
More secure
Deterministic encryption
Encrypt('123-45-6789') = 0x85a55d3f
Repeat: Encrypt('123-45-6789') = 0x85a55d3f
Allows for transparent retrieval of encrypted data AND
equality comparison
E.g. in WHERE clauses and joins, distinct, group by
Types of encryption
 Randomized encryption uses a method
that encrypts data in a less predictable
manner
 Deterministic encryption uses a
method that always generates the
same encrypted value for any given
plaintext value
Encryption - Types of encryption
Select columns to
be encrypted
Analyze schema
and application
queries to detect
conflicts (build
time)Set up keys:
Master and CEK
Static schema
analysis tool
(SSDT only)
UI for selecting columns (no
automated data classification)
Key setup tool to automate
selecting CMK, generating and
encrypting CEK, and uploading
key metadata to database
Security
Encryption - Always Encrypted Setup (SSMS or SSDT)
Demo
Always Encrypted
Proactive
Monitoring
Monitoring– Auditing & Threat Detection in Azure
Azure Security Center will recommend that you
turn on auditing for all databases on your Azure
SQL servers if auditing is not already enabled.
Auditing can help you maintain regulatory
compliance, understand database activity, and
gain insight into discrepancies and anomalies
that could indicate business concerns or
suspected security violations.
Monitoring– Azure SQL Database Threat Detection
 Just turn it ON - SQL Database Threat Detection is
incredibly easy to enable.
 Real-time actionable alerts - SQL Database Threat
Detection runs multiple sets of algorithms which detect
potential vulnerabilities and SQL injection attacks, as well
as anomalous database access patterns (such as access
from an unusual location or by an unfamiliar principal).
 Investigate SQL threat - Each SQL Database Threat
Detection email notification and Azure Security Center
alert includes a direct link to the SQL audit log.
Demo
Auditing & Threat Detection in Azure Security Center
Data Security and Compliance Assessment Offer
Objective
• Uncover security vulnerabilities by evaluating the architecture and security
configurations for your critical assets and repositories both on-premise and
in the cloud.
• Recommend an optimized setup to enhance the protection of your data at-
rest and in-motion.
Activities
Estimated Duration
Deliverable
• Microsoft Data Platform security technical-level overview
• Review of overall security and compliance goals for your organization
• Analysis of identified data repositories and data movement functions
• Presentation of findings, recommendations, and roadmap
• WinWire’s Data Security and Compliance Assessment will typically take
1 to 2 weeks.
• A comprehensive assessment documentation with specific recommendations
and an actionable roadmap to help you achieve your data security and
compliance goals
Please contact marketing@winwire.com
for a free
Data Security and Compliance
Assessment Offer
Q & A
http://www.winwire.com/blog-winsights/
www.twitter.com/winwire
marketing@winwire.com
www.winwire.com

More Related Content

What's hot (20)

PDF
Information Security Whitepaper
run_frictionless
 
PPTX
Overview of Microsoft Exchange Online
Microsoft Private Cloud
 
PDF
Office 365 cloud principles
Motty Ben Atia
 
PPTX
Improving Application Security With Azure
Softchoice Corporation
 
PDF
Azure Security Overview
David J Rosenthal
 
PDF
Microsoft 365 Security and Compliance
David J Rosenthal
 
PPTX
SharePoint Saturday Cambridge: Security & compliance
Albert Hoitingh
 
PDF
Andy Malone - The new office 365 for it pro's
Nordic Infrastructure Conference
 
PPTX
Security that works with, not against, your SaaS business
CloudPassage
 
PDF
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
PPTX
Cloud Based Rights Management with Azure RMS
Morgan Simonsen
 
PPTX
Azure Sentinel.pptx
Mohit Chhabra
 
PDF
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
PPTX
Microsoft 365
Jeannette Browning
 
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
 
PDF
Azure saturday 2017 - Protecting cloud identities using ems
Ronni Pedersen
 
PPTX
Azure Security Overview
Allen Brokken
 
PDF
Microsoft Azure Security Overview
Alert Logic
 
PDF
Getting ready for Infrastructure Transformation with hyper-converged
Synapse360
 
PPTX
Trust No-One Architecture For Services And Data
Aidan Finn
 
Information Security Whitepaper
run_frictionless
 
Overview of Microsoft Exchange Online
Microsoft Private Cloud
 
Office 365 cloud principles
Motty Ben Atia
 
Improving Application Security With Azure
Softchoice Corporation
 
Azure Security Overview
David J Rosenthal
 
Microsoft 365 Security and Compliance
David J Rosenthal
 
SharePoint Saturday Cambridge: Security & compliance
Albert Hoitingh
 
Andy Malone - The new office 365 for it pro's
Nordic Infrastructure Conference
 
Security that works with, not against, your SaaS business
CloudPassage
 
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
Cloud Based Rights Management with Azure RMS
Morgan Simonsen
 
Azure Sentinel.pptx
Mohit Chhabra
 
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
Microsoft 365
Jeannette Browning
 
3 Modern Security - Secure identities to reach zero trust with AAD
Andrew Bettany
 
Azure saturday 2017 - Protecting cloud identities using ems
Ronni Pedersen
 
Azure Security Overview
Allen Brokken
 
Microsoft Azure Security Overview
Alert Logic
 
Getting ready for Infrastructure Transformation with hyper-converged
Synapse360
 
Trust No-One Architecture For Services And Data
Aidan Finn
 

Viewers also liked (18)

PPT
Database security
Shivnandan Singh
 
PDF
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
SBGC
 
PPT
Database & Data Security
Cloudbells.com
 
PDF
Data and database security and controls
FITSFSd
 
PDF
Weka project - DataMining
Safiya Najeh
 
PDF
20130716 AWS Meister re:Generate - Amazon Redshift (Korean)
Amazon Web Services Korea
 
PDF
20150125 AWS BlackBelt - Amazon RDS (Korean)
Amazon Web Services Korea
 
PPTX
Getting started with Azure Services Platform
TedAhn
 
PDF
Amazon RDS 서비스 활용하기 - 신규 기능 중심으로 (윤석찬) :: AWS 월간 웨비나
Amazon Web Services Korea
 
PDF
Amazon RDS 살펴보기 (김용우) - AWS 웨비나 시리즈
Amazon Web Services Korea
 
PDF
Ad hoc Networks
Darpan Dekivadiya
 
PDF
SQLER on Windows Azure camp - SQL Database
근호 이
 
PDF
Microsoft azure service 소개자료
Alvin You
 
PDF
Data- and database security & GDPR: end-to-end offer
Capgemini
 
PDF
Security on AWS :: 이경수 솔루션즈아키텍트
Amazon Web Services Korea
 
PDF
Azure SQL Database
jorge Muchaypiña
 
PPT
Database Security
alraee
 
PPTX
Data security in cloud computing
Prince Chandu
 
Database security
Shivnandan Singh
 
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
SBGC
 
Database & Data Security
Cloudbells.com
 
Data and database security and controls
FITSFSd
 
Weka project - DataMining
Safiya Najeh
 
20130716 AWS Meister re:Generate - Amazon Redshift (Korean)
Amazon Web Services Korea
 
20150125 AWS BlackBelt - Amazon RDS (Korean)
Amazon Web Services Korea
 
Getting started with Azure Services Platform
TedAhn
 
Amazon RDS 서비스 활용하기 - 신규 기능 중심으로 (윤석찬) :: AWS 월간 웨비나
Amazon Web Services Korea
 
Amazon RDS 살펴보기 (김용우) - AWS 웨비나 시리즈
Amazon Web Services Korea
 
Ad hoc Networks
Darpan Dekivadiya
 
SQLER on Windows Azure camp - SQL Database
근호 이
 
Microsoft azure service 소개자료
Alvin You
 
Data- and database security & GDPR: end-to-end offer
Capgemini
 
Security on AWS :: 이경수 솔루션즈아키텍트
Amazon Web Services Korea
 
Azure SQL Database
jorge Muchaypiña
 
Database Security
alraee
 
Data security in cloud computing
Prince Chandu
 
Ad

Similar to Modern Data Security for the Enterprises – SQL Server & Azure SQL Database (20)

PPTX
Azure Fundamentals Part 3
CCG
 
PPTX
Sql server security in an insecure world
Gianluca Sartori
 
PDF
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
 
PDF
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
PPTX
Database security
Arpana shree
 
PDF
Oracle database 12c security and compliance
FITSFSd
 
PDF
Oracle-Security_Executive-Presentation
stefanjung
 
PDF
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
PDF
Best Practices in Cloud Security
Alert Logic
 
PDF
Microsoft SQL Family and GDPR
Antonios Chatzipavlis
 
PPTX
MobileDBSecurity.pptx
missionsk81
 
PDF
Ingres database and compliance
Actian Corporation
 
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
PDF
ALTR Company Overview 2023
Kim Cook
 
PPTX
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
PDF
GreenSQL Security
ijsrd.com
 
DOCX
Database security
Mehrdad Jingoism
 
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
AnuradhaGupta789099
 
PPTX
DBMS SECURITY
Wasim Raza
 
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Azure Fundamentals Part 3
CCG
 
Sql server security in an insecure world
Gianluca Sartori
 
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
 
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
Database security
Arpana shree
 
Oracle database 12c security and compliance
FITSFSd
 
Oracle-Security_Executive-Presentation
stefanjung
 
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
Best Practices in Cloud Security
Alert Logic
 
Microsoft SQL Family and GDPR
Antonios Chatzipavlis
 
MobileDBSecurity.pptx
missionsk81
 
Ingres database and compliance
Actian Corporation
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Jürgen Ambrosi
 
ALTR Company Overview 2023
Kim Cook
 
Securely Harden Microsoft 365 with Secure Score
Joel Oleson
 
GreenSQL Security
ijsrd.com
 
Database security
Mehrdad Jingoism
 
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
AnuradhaGupta789099
 
DBMS SECURITY
Wasim Raza
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
European Collaboration Summit
 
Ad

More from WinWire Technologies Inc (20)

PDF
Accelerate Application Innovation Journey with Azure Kubernetes Service
WinWire Technologies Inc
 
PDF
CRM Technology Trends to Watch in 2020
WinWire Technologies Inc
 
PDF
Azure Synapse Analytics
WinWire Technologies Inc
 
PDF
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
WinWire Technologies Inc
 
PPTX
Build a Modern Workplace using Microsoft Teams
WinWire Technologies Inc
 
PDF
Build distributed, highly scalable applications in .NET using Microsoft Orleans
WinWire Technologies Inc
 
PDF
Getting Started with Infrastructure as Code
WinWire Technologies Inc
 
PDF
Box to OneDrive Migration
WinWire Technologies Inc
 
PDF
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
PDF
Building Hybrid Cloud Apps with Azure and Azure stack
WinWire Technologies Inc
 
PPTX
Microsoft Teams – The Future of Teamwork in Office 365
WinWire Technologies Inc
 
PPTX
Designing Resilient Applications on Microsoft Azure/Disaster Recovery of Appl...
WinWire Technologies Inc
 
PDF
Getting Ready for Hybrid SharePoint – SharePoint On-Premise, Office 365 & Az...
WinWire Technologies Inc
 
PDF
Azure Serverless with Functions, Logic Apps, and Event Grid
WinWire Technologies Inc
 
PPT
Drive Your Digital Transformation with Microsoft Dynamics 365
WinWire Technologies Inc
 
PDF
Migration from eRoom to office 365
WinWire Technologies Inc
 
PDF
Building Intelligent Cloud with Microsoft Azure
WinWire Technologies Inc
 
PPTX
ASP.NET Core 1.0: Understanding ASP.NET Core 1.0 (ASP.NET 5)
WinWire Technologies Inc
 
PPT
DevOps and Visual Studio Team Services
WinWire Technologies Inc
 
PDF
Azure Resource Manager (ARM) Templates
WinWire Technologies Inc
 
Accelerate Application Innovation Journey with Azure Kubernetes Service
WinWire Technologies Inc
 
CRM Technology Trends to Watch in 2020
WinWire Technologies Inc
 
Azure Synapse Analytics
WinWire Technologies Inc
 
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
WinWire Technologies Inc
 
Build a Modern Workplace using Microsoft Teams
WinWire Technologies Inc
 
Build distributed, highly scalable applications in .NET using Microsoft Orleans
WinWire Technologies Inc
 
Getting Started with Infrastructure as Code
WinWire Technologies Inc
 
Box to OneDrive Migration
WinWire Technologies Inc
 
Secure Your Cloud Environment with Azure Active Directory (AD)
WinWire Technologies Inc
 
Building Hybrid Cloud Apps with Azure and Azure stack
WinWire Technologies Inc
 
Microsoft Teams – The Future of Teamwork in Office 365
WinWire Technologies Inc
 
Designing Resilient Applications on Microsoft Azure/Disaster Recovery of Appl...
WinWire Technologies Inc
 
Getting Ready for Hybrid SharePoint – SharePoint On-Premise, Office 365 & Az...
WinWire Technologies Inc
 
Azure Serverless with Functions, Logic Apps, and Event Grid
WinWire Technologies Inc
 
Drive Your Digital Transformation with Microsoft Dynamics 365
WinWire Technologies Inc
 
Migration from eRoom to office 365
WinWire Technologies Inc
 
Building Intelligent Cloud with Microsoft Azure
WinWire Technologies Inc
 
ASP.NET Core 1.0: Understanding ASP.NET Core 1.0 (ASP.NET 5)
WinWire Technologies Inc
 
DevOps and Visual Studio Team Services
WinWire Technologies Inc
 
Azure Resource Manager (ARM) Templates
WinWire Technologies Inc
 

Recently uploaded (20)

PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PDF
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked} 2025
hashhshs786
 
PPTX
Revolutionizing Code Modernization with AI
KrzysztofKkol1
 
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
Imma Valls Bernaus
 
PDF
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
PPTX
An Introduction to ZAP by Checkmarx - Official Version
Simon Bennetts
 
PDF
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
PDF
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
PDF
Digger Solo: Semantic search and maps for your local files
seanpedersen96
 
PPTX
Fundamentals_of_Microservices_Architecture.pptx
MuhammadUzair504018
 
PDF
Revenue streams of the Wazirx clone script.pdf
aaronjeffray
 
PDF
Executive Business Intelligence Dashboards
vandeslie24
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PPTX
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
PDF
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
PPTX
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
PDF
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pdf
Varsha Nayak
 
Capcut Pro Crack For PC Latest Version {Fully Unlocked} 2025
hashhshs786
 
Revolutionizing Code Modernization with AI
KrzysztofKkol1
 
Understanding the Need for Systemic Change in Open Source Through Intersectio...
Imma Valls Bernaus
 
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
An Introduction to ZAP by Checkmarx - Official Version
Simon Bennetts
 
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
Digger Solo: Semantic search and maps for your local files
seanpedersen96
 
Fundamentals_of_Microservices_Architecture.pptx
MuhammadUzair504018
 
Revenue streams of the Wazirx clone script.pdf
aaronjeffray
 
Executive Business Intelligence Dashboards
vandeslie24
 
Tally software_Introduction_Presentation
AditiBansal54083
 
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
A Complete Guide to Salesforce SMS Integrations Build Scalable Messaging With...
360 SMS APP
 
Odoo CRM vs Zoho CRM: Honest Comparison 2025
Odiware Technologies Private Limited
 

Modern Data Security for the Enterprises – SQL Server & Azure SQL Database

  • 1. Modern Data Security for the Enterprises – SQL Server & Azure SQL Database Notes:  If you experience audio issues during the webinar, you can dial in through telephone details provided to you in your registration confirmation email.  Please feel free to post questions in the questions dialog & we will try to answer as many as we can at the end.  Recording of this session will be shared in next 24-48 hours.  You can also write to us at [email protected] for any clarifications or information.
  • 2. Session Speaker Sergei Kolpakov Sr. Principal Consultant Siddhartha Gaur Technical Architect
  • 3. Agenda 2. Modern Approach - Technology + Processes 3. Demo 4. Q&A 1. Data Security Threats
  • 4. Data Security 2016 saw some of the largest data breaches ever, and while companies continue to fight the good fight against hackers and identity theft, Data Security has been one of the major concern for organizations across the globe. What are data security threats? OutsiderInsider
  • 5. Data Security – How to ensure?
  • 6. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is an essential aspect of IT for organizations of every size and type. Data security is also known as information security (IS) • Obfuscating Data using key-based cryptography, or obscuring data with alternate text. • Ensure data is only legible to the intended audience Data Encryption • Management of Logins and Roles to restrict access of data • Prevent unauthorized persons from obtaining sensitive information Access Control • Detailed logging of failed authentication attempts for use in access auditing, as well as raise alerts on anomalous activity which may indicate a security threat Proactive Monitoring Enterprise Data Security
  • 7. Protect your organization, data and people
  • 8. Access Control Authorization – What all could you do? Identification – Are you allowed? Authentication – Who are you?
  • 9. Access Control - Firewall  Protects network and its resources from malicious external users  Secure confidential information from those who do not have “explicit” access to it  Firewall settings enable administrators to determine conditions for which a connection to the server instance is allowed  Windows authentication in SQL Server provides centralized access control with Active Directory  SSL/TLS secures connections to SQL Server
  • 10. Access Control - Active Directory Authentication  Secure access to on-premises and cloud applications, including Microsoft online services like Office 365 and many non-Microsoft SaaS applications  Extend to Azure Active Directory on cloud for simplified user access  User attributes along with roles and access permissions are automatically synchronized to cloud directory  Every organization resource request is validated to ensures only authenticated users connects to that resource  Avoid using SQL Authentication
  • 11. Access Control - Separation of Roles  Not every authenticated user should access everything. Only authorized users should get access to any resource/data  Role-based access control (RBAC) is an approach to restricting system access to authorized users.  Permissions are associated with roles, and users are assigned to appropriate roles  Roles are created for the various job functions in an organization and users are assigned roles based on their responsibilities and qualifications  Users can be easily reassigned from one role to another
  • 12. Access Control - Permission  Granular access permissions for the organization's repositories  Admin must ensure that minimum required permissions are given to any role/user to allow it complete the required tasks. No less and No More  Read, Write and Execute - Ensure right user have right set of permissions, to avoid any malicious or accidental threat to data security  Regular audit of permissions must be done Read ExecuteWrite
  • 13. Access Control - Row-Level Security  RLS enables storing data for many users in a single database and table while ensuring user sees only her/his data  Access is restricted to row-level, and based on a user's identity, role, and/ or execution context  Access logic is centralized  Reduced risk of error in application code Row-Level Security • Fine-grained access control • Application Transparency • Centralized security logic
  • 14. Access Control - Row-Level Security How to implement RLS
  • 16. Access Control - Dynamic Data Masking  Protects against unauthorized disclosure of sensitive data in the application  Protect personally identifiable information  Regulatory Compliance  Expose sensitive data only on a need-to-know basis  In absence of this typically Custom obfuscation in application, views or third party solutions are used to address this need
  • 19. Encryption - Transparent Data Encryption (TDE) Protects sensitive data stored in a SQL Database from unauthorized access
  • 20. Encryption – T-SQL vs Azure to Setup TDE Certificate USE master; GO CREATE MASTER KEY ENCRYPTION BY PASSWORD = ‘sw9*K!j^*8u77*sso&#7*sso'; go CREATE CERTIFICATE MyServerCert WITH SUBJECT = 'My DEK Certificate'; go USE MyDb; GO CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_128 ENCRYPTION BY SERVER CERTIFICATE MyServerCert; GO ALTER DATABASE MyDb SET ENCRYPTION ON; GO BACKUP CERTIFICATE MyServerCert TO FILE = 'C:Program FilesMicrosoft SQL ServerMSSQL13.MSSQLSERVERMSSQLBackupMyDEKCertificate' WITH PRIVATE KEY (FILE = 'C:Program FilesMicrosoft SQL ServerMSSQL13.MSSQLSERVERMSSQLBackupMyDEKKey', ENCRYPTION BY PASSWORD = '@1Qswkmswojd3i*nn77^7778Y34%#') GO
  • 21. Data disclosure prevention Client-side encryption of sensitive data using keys that are never given to the database system Queries on encrypted data Support for equality comparison, including join, group by, and distinct operators Application transparency Minimal application changes via server and client library enhancements Allows customers to securely store sensitive data outside of their trust boundary. Data remains protected from high-privileged, yet unauthorized, users. Security Encryption – The need for Always Encrypted
  • 22. Encryption – How it Works Help protect data at rest and in motion, on-premises & cloud SQL Server or SQL Database ADO .NET Name Wayne Jefferson Name 0x19ca706fbd9a Result SetResult Set Client Name SSN Country 0x19ca706fbd9a 0x7ff654ae6d USA dbo.Customers ciphertext "SELECT Name FROM Customers WHERE SSN = @SSN", 0x7ff654ae6d ciphertext "SELECT Name FROM Customers WHERE SSN = @SSN", "111-22-3333" Encrypted sensitive data and corresponding keys are never seen in plaintext in SQL Server trust boundary
  • 23. Randomized encryption Encrypt('123-45-6789') = 0x17cfd50a Repeat: Encrypt('123-45-6789') = 0x9b1fcf32 Allows for transparent retrieval of encrypted data but NO operations More secure Deterministic encryption Encrypt('123-45-6789') = 0x85a55d3f Repeat: Encrypt('123-45-6789') = 0x85a55d3f Allows for transparent retrieval of encrypted data AND equality comparison E.g. in WHERE clauses and joins, distinct, group by Types of encryption  Randomized encryption uses a method that encrypts data in a less predictable manner  Deterministic encryption uses a method that always generates the same encrypted value for any given plaintext value Encryption - Types of encryption
  • 24. Select columns to be encrypted Analyze schema and application queries to detect conflicts (build time)Set up keys: Master and CEK Static schema analysis tool (SSDT only) UI for selecting columns (no automated data classification) Key setup tool to automate selecting CMK, generating and encrypting CEK, and uploading key metadata to database Security Encryption - Always Encrypted Setup (SSMS or SSDT)
  • 27. Monitoring– Auditing & Threat Detection in Azure Azure Security Center will recommend that you turn on auditing for all databases on your Azure SQL servers if auditing is not already enabled. Auditing can help you maintain regulatory compliance, understand database activity, and gain insight into discrepancies and anomalies that could indicate business concerns or suspected security violations.
  • 28. Monitoring– Azure SQL Database Threat Detection  Just turn it ON - SQL Database Threat Detection is incredibly easy to enable.  Real-time actionable alerts - SQL Database Threat Detection runs multiple sets of algorithms which detect potential vulnerabilities and SQL injection attacks, as well as anomalous database access patterns (such as access from an unusual location or by an unfamiliar principal).  Investigate SQL threat - Each SQL Database Threat Detection email notification and Azure Security Center alert includes a direct link to the SQL audit log.
  • 29. Demo Auditing & Threat Detection in Azure Security Center
  • 30. Data Security and Compliance Assessment Offer Objective • Uncover security vulnerabilities by evaluating the architecture and security configurations for your critical assets and repositories both on-premise and in the cloud. • Recommend an optimized setup to enhance the protection of your data at- rest and in-motion. Activities Estimated Duration Deliverable • Microsoft Data Platform security technical-level overview • Review of overall security and compliance goals for your organization • Analysis of identified data repositories and data movement functions • Presentation of findings, recommendations, and roadmap • WinWire’s Data Security and Compliance Assessment will typically take 1 to 2 weeks. • A comprehensive assessment documentation with specific recommendations and an actionable roadmap to help you achieve your data security and compliance goals
  • 31. Please contact [email protected] for a free Data Security and Compliance Assessment Offer

Editor's Notes

  • #25: Source: https://msdn.microsoft.com/en-us/library/mt147923(v=sql.130).aspx