SlideShare a Scribd company logo
Security & Compliance



                                        Microsoft® SQL Server® 2008 R2 offers built-in
                                        security and compliance capabilities that help
                                        provide effective management of security feature
                                        configuration, strong authentication and access
                                        control, powerful encryption and key
                                        management capabilities, and enhanced auditing.


                                         PROTECT DATA
KEY FEATURES
                                         Help protect your data with a
   Use Policy-Based Management to
                                         database solution that is historically
    help manage and detect non-
                                         known for the lowest vulnerabilities*
    compliance with security polices
                                         across the major DBMS vendors.
    for data across the enterprise.
   Encrypt data without modifying       Take advantage of a built-in
    applications by using Transparent    cryptography hierarchy
    Data Encryption.
                                         Use the built-in cryptography
   Employ enterprise wide               hierarchy in SQL Server to create
    encryption solutions with            asymmetric keys, symmetric keys,               Transparent Data Encryption
    Extensible Key Management and        and certificates.
    Hardware Security Modules.                                                     Employ Extensible Key
   Implement high-performance,          Encrypt data transparently                Management
    granular auditing with SQL Server    Reduce the complexity of                  Consolidate your enterprise
    Audit.                               developing applications that require      encryption by using an Enterprise
COMPLIANCE &                             encrypted data by performing all          Key Management system. Separate
CERTIFICATIONS                           encryption transparently at the           your data from the keys using
                                         database level through a security         Hardware Security Modules to store
   SQL Server 2008 Enterprise                                                     the keys in separate hardware.
                                         enhanced database encryption key
    edition has completed an IT          (DEK). Enable application                 Simplify key management by using
    security evaluation at the Basic     developers to access encrypted            specialist systems. Currently the
    Assurance Level EAL1+, EAL4+ is      data without changing existing            following HSM vendors support SQL
    in progress and recognized by US     applications.                             Server EKM; SafeNet,
    government bodies.                                                             Thales/nCipher, and Arx Inc.
   SQL Server 2008 has been
    audited for Payment Card Industry                                              Sign code modules
    (PCI) Data Security Standard                                                   Use a key or certificate to add a
    (DSS) Compliance.                                                              digital signature to code modules
   SQL Server 2008 has been                                                       such as stored procedures and
    audited for HIPAA Compliance.                                                  functions, and then associate
                                                                                   additional permissions to the



*nist.org                               SQL Server 2008 R2 Security & Compliance
signature for the duration of the                            Simplify permission management                                           Securing the surface area
                                                                                                                                            with policies
code module execution.                                       Use schemas to simplify and                                   Automatically apply software
                                                             improve flexibility of large                                  updates
CONTROL ACCESS
                                                             databases. Grant permissions to a
Control access to your data by                                                                                             Use Windows Update to
                                                             schema to grant permissions to
managing authentication and                                                                                                automatically apply SQL
                                                             every object contained in the
authorization effectively and by                                                                                           Server 2008 patches. Reduce
                                                             schema and every object created in
providing access to only users who                                                                                         threats caused by known software
                                                             that schema in the future.
need it.                                                                                                                   vulnerabilities.

Enforce password policies                                                                                                  Enhanced auditing with the SQL
                                                                                                                           Server Audit
Automatically apply the password
policies of Microsoft Windows®                                                                                             Define audits to automatically record
Server 2003 (or later) to enforce                                                                                          activity in log files, the Windows
minimum password length, proper                                                                                            Application log, or the Windows
character combinations, and                                                                                                Security log. Take full control of
regularly-changing passwords even                                                                                          auditing by creating audit
when using SQL Server logins.                                                                                              specifications to determine the
                                                                                                                           server and database actions to
Use roles and proxy accounts                                                                                               include in the audit.
                                                                              Schema creation
Use msdb database fixed database
roles to increase control over Agent                         ENSURE COMPLIANCE
services. Use multiple proxy
accounts to make execution of a                              Ensure compliance with company
SQL Server Integration Services                              policies and/or government
(SSIS) package as a job step more                            regulations like HIPAA and PCI.
secure.
                                                             Configure the surface area with
Provide security enhanced
                                                             automated Policy-Based
metadata access
                                                             Management
Provide security-enhanced access
                                                             Use Policy-Based Management to
to metadata by using catalog views,
                                                             help ensure compliance with
enabling users to view metadata                                                                                                             All Action audit
                                                             configuration policies for servers,
only for those objects that they have
                                                             databases, and database objects
access to.                                                                                                                 Create custom auditing solutions
                                                             across the enterprise. Help reduce
                                                                                                                           with DDL triggers
Enhance security features with                               your exposure to security threats by
                                                             using the new Surface Area facet to                           Capture and audit data definition
execution context                                                                                                          language (DDL) activities by using
                                                             control active services and features.
Mark modules with an execution                                                                                             triggers. Extend triggers to respond
context so that statements within the                                                                                      to DDL events as well as data
module execute as a particular user                                                                                        manipulation language (DML)
instead of the calling user. Grant the                                                                                     events and log DDL events,
calling user permission to execute                                                                                         improving auditing and enhancing
the module, but use the permissions                                                                                        security.
of the execution context for
statements within the module.




This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real
company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. (Use this only if fictitious content appears.)
Ad

More Related Content

What's hot (20)

Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
Symantec
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Banking at Ho Chi Minh city
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
infolive
 
System Center
System CenterSystem Center
System Center
Blauge
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
ITCamp
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
abelsonp
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
Eduardo Castro
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
nick_garrod
 
IronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-DatasheetIronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-Datasheet
Vishal Mittal
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
MarketingArrowECS_CZ
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private Cloud
Lai Yoong Seng
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Herman Arnedo
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
Ramesh Nagappan
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
Array Networks
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Discover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active DirectoryDiscover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active Directory
Microsoft TechNet - Belgium and Luxembourg
 
Plm flex assist v1.4
Plm flex assist v1.4Plm flex assist v1.4
Plm flex assist v1.4
plmflex
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
Symantec
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Banking at Ho Chi Minh city
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
infolive
 
System Center
System CenterSystem Center
System Center
Blauge
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
ITCamp
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
abelsonp
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
nick_garrod
 
IronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-DatasheetIronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-Datasheet
Vishal Mittal
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
MarketingArrowECS_CZ
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private Cloud
Lai Yoong Seng
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Herman Arnedo
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
Ramesh Nagappan
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Plm flex assist v1.4
Plm flex assist v1.4Plm flex assist v1.4
Plm flex assist v1.4
plmflex
 

Similar to Sql server 2008 r2 security datasheet (20)

Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor admins
Klaudiia Jacome
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
Seguridad en SQL Server 2012
Seguridad en SQL Server 2012Seguridad en SQL Server 2012
Seguridad en SQL Server 2012
Juan Fabian
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
Aditya Bhuyan
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
Aditya Bhuyan
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 Highlights
Intergen
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
Paul Tompsett
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
Christian Frahm
 
Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013
sqlserver.co.il
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
dotnetcode
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
SQL Server R2 Sunumu
SQL Server R2 SunumuSQL Server R2 Sunumu
SQL Server R2 Sunumu
ÇözümPARK
 
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 DatasheetMicrosoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft Private Cloud
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
Ismail Muhammad
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
XebiaLabs
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
guestea92ba
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
OlivierMichot
 
Microsoft SQL Azure - Cloud Based Database Datasheet
Microsoft SQL Azure - Cloud Based Database DatasheetMicrosoft SQL Azure - Cloud Based Database Datasheet
Microsoft SQL Azure - Cloud Based Database Datasheet
Microsoft Private Cloud
 
Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor admins
Klaudiia Jacome
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
Seguridad en SQL Server 2012
Seguridad en SQL Server 2012Seguridad en SQL Server 2012
Seguridad en SQL Server 2012
Juan Fabian
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
Aditya Bhuyan
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 Highlights
Intergen
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
Paul Tompsett
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
Christian Frahm
 
Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013
sqlserver.co.il
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
dotnetcode
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
SQL Server R2 Sunumu
SQL Server R2 SunumuSQL Server R2 Sunumu
SQL Server R2 Sunumu
ÇözümPARK
 
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 DatasheetMicrosoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft Private Cloud
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
Ismail Muhammad
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
XebiaLabs
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
guestea92ba
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
OlivierMichot
 
Microsoft SQL Azure - Cloud Based Database Datasheet
Microsoft SQL Azure - Cloud Based Database DatasheetMicrosoft SQL Azure - Cloud Based Database Datasheet
Microsoft SQL Azure - Cloud Based Database Datasheet
Microsoft Private Cloud
 
Ad

More from Klaudiia Jacome (20)

Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7
Klaudiia Jacome
 
Si las cosas van mal
Si las cosas van malSi las cosas van mal
Si las cosas van mal
Klaudiia Jacome
 
Analysis services
Analysis  servicesAnalysis  services
Analysis services
Klaudiia Jacome
 
Enterprise security
Enterprise securityEnterprise security
Enterprise security
Klaudiia Jacome
 
Performance
PerformancePerformance
Performance
Klaudiia Jacome
 
Performance
PerformancePerformance
Performance
Klaudiia Jacome
 
Enterprise security
Enterprise securityEnterprise security
Enterprise security
Klaudiia Jacome
 
Data warehouse
Data warehouseData warehouse
Data warehouse
Klaudiia Jacome
 
Managemen tools
Managemen toolsManagemen tools
Managemen tools
Klaudiia Jacome
 
Managemen tolos
Managemen tolosManagemen tolos
Managemen tolos
Klaudiia Jacome
 
Datos espaciales
Datos espacialesDatos espaciales
Datos espaciales
Klaudiia Jacome
 
Data warehouse
Data warehouseData warehouse
Data warehouse
Klaudiia Jacome
 
Avances analticos
Avances analticosAvances analticos
Avances analticos
Klaudiia Jacome
 
Applicationandmulti instances
Applicationandmulti instancesApplicationandmulti instances
Applicationandmulti instances
Klaudiia Jacome
 
Sql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheetSql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheet
Klaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
Klaudiia Jacome
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data services
Klaudiia Jacome
 
Sql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_finalSql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_final
Klaudiia Jacome
 
Sql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deckSql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deck
Klaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
Klaudiia Jacome
 
Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7
Klaudiia Jacome
 
Applicationandmulti instances
Applicationandmulti instancesApplicationandmulti instances
Applicationandmulti instances
Klaudiia Jacome
 
Sql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheetSql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheet
Klaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
Klaudiia Jacome
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data services
Klaudiia Jacome
 
Sql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_finalSql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_final
Klaudiia Jacome
 
Sql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deckSql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deck
Klaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
Klaudiia Jacome
 
Ad

Recently uploaded (20)

What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 

Sql server 2008 r2 security datasheet

  • 1. Security & Compliance Microsoft® SQL Server® 2008 R2 offers built-in security and compliance capabilities that help provide effective management of security feature configuration, strong authentication and access control, powerful encryption and key management capabilities, and enhanced auditing. PROTECT DATA KEY FEATURES Help protect your data with a  Use Policy-Based Management to database solution that is historically help manage and detect non- known for the lowest vulnerabilities* compliance with security polices across the major DBMS vendors. for data across the enterprise.  Encrypt data without modifying Take advantage of a built-in applications by using Transparent cryptography hierarchy Data Encryption. Use the built-in cryptography  Employ enterprise wide hierarchy in SQL Server to create encryption solutions with asymmetric keys, symmetric keys, Transparent Data Encryption Extensible Key Management and and certificates. Hardware Security Modules. Employ Extensible Key  Implement high-performance, Encrypt data transparently Management granular auditing with SQL Server Reduce the complexity of Consolidate your enterprise Audit. developing applications that require encryption by using an Enterprise COMPLIANCE & encrypted data by performing all Key Management system. Separate CERTIFICATIONS encryption transparently at the your data from the keys using database level through a security Hardware Security Modules to store  SQL Server 2008 Enterprise the keys in separate hardware. enhanced database encryption key edition has completed an IT (DEK). Enable application Simplify key management by using security evaluation at the Basic developers to access encrypted specialist systems. Currently the Assurance Level EAL1+, EAL4+ is data without changing existing following HSM vendors support SQL in progress and recognized by US applications. Server EKM; SafeNet, government bodies. Thales/nCipher, and Arx Inc.  SQL Server 2008 has been audited for Payment Card Industry Sign code modules (PCI) Data Security Standard Use a key or certificate to add a (DSS) Compliance. digital signature to code modules  SQL Server 2008 has been such as stored procedures and audited for HIPAA Compliance. functions, and then associate additional permissions to the *nist.org SQL Server 2008 R2 Security & Compliance
  • 2. signature for the duration of the Simplify permission management Securing the surface area with policies code module execution. Use schemas to simplify and Automatically apply software improve flexibility of large updates CONTROL ACCESS databases. Grant permissions to a Control access to your data by Use Windows Update to schema to grant permissions to managing authentication and automatically apply SQL every object contained in the authorization effectively and by Server 2008 patches. Reduce schema and every object created in providing access to only users who threats caused by known software that schema in the future. need it. vulnerabilities. Enforce password policies Enhanced auditing with the SQL Server Audit Automatically apply the password policies of Microsoft Windows® Define audits to automatically record Server 2003 (or later) to enforce activity in log files, the Windows minimum password length, proper Application log, or the Windows character combinations, and Security log. Take full control of regularly-changing passwords even auditing by creating audit when using SQL Server logins. specifications to determine the server and database actions to Use roles and proxy accounts include in the audit. Schema creation Use msdb database fixed database roles to increase control over Agent ENSURE COMPLIANCE services. Use multiple proxy accounts to make execution of a Ensure compliance with company SQL Server Integration Services policies and/or government (SSIS) package as a job step more regulations like HIPAA and PCI. secure. Configure the surface area with Provide security enhanced automated Policy-Based metadata access Management Provide security-enhanced access Use Policy-Based Management to to metadata by using catalog views, help ensure compliance with enabling users to view metadata All Action audit configuration policies for servers, only for those objects that they have databases, and database objects access to. Create custom auditing solutions across the enterprise. Help reduce with DDL triggers Enhance security features with your exposure to security threats by using the new Surface Area facet to Capture and audit data definition execution context language (DDL) activities by using control active services and features. Mark modules with an execution triggers. Extend triggers to respond context so that statements within the to DDL events as well as data module execute as a particular user manipulation language (DML) instead of the calling user. Grant the events and log DDL events, calling user permission to execute improving auditing and enhancing the module, but use the permissions security. of the execution context for statements within the module. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. (Use this only if fictitious content appears.)