Azure SQL Database Security v5
Azure SQL Database Security v5
Database
Other Mechanisms
Proactive monitoring
Protect Data
Application Control
Access
How Connections
work
SQL Server
Platform History
SQL Server Platform History
Hybrid Cloud
Managed database service
Lower cost
Shared
Sessions
Active Directory
Encryption
Security
Transparent Data
Data protection
Encryption
Row-level security
Analysis
Azure Active
Directory Security Always Encrypted SQL Auditing
Dynamic data
masking
Firewall TLS Threat Detection
C2 common
Proxy:
ADALSQL
• Protect
ADO AAD connection
.NET 4.6 • Check
firewall rules
• Port Bridge
• Hexatier/GreenSQ
Authentication L
Method. • VPN is not
supported
Security Approach – How Connections work Inside
Azure
servername.database.windows.net
TCP, Port: 1433
S S
P
S
Security Approach – How Connections work
Outside Azure
servername.database.windows.net
TCP, Port: 1433
S S
P
S
Security Approach – Control Application Access
Dynamic Data Masking
Row-Level Security
Centralize your
row access logic
within the
database.
Demo
Encryption in
motion:
Transport Layer
Security (TLS)
"SELECT Name FROM
Customers WHERE SSN =
@SSN", "SELECT Name FROM
Customers WHERE SSN
Name Encryption in use (client):
0x7ff654ae6d
ADO
= @SSN",
DB Jim Gray Always Encrypted (AE)
"111-22-3333"
.NET
Name
Protects the highly sensitive data in-use from
0x19ca706fbd9a
high privilege SQL users.
Demo
Always Encrypted
Demo - Always Encrypted
Pfx CREATE COLUMN MASTER KEY DEFINITION [MyMKey]
Certificate WITH ( KEY_STORE_PROVIDER_NAME = N'MSSQL_CERTIFICATE_STORE', KEY_PATH=N'CurrentUser/My/0055B6F4C592DCAD70B7F3C24CE4499C6D58E24B')
Threat Detection
Detects suspicious database activities indicating
possible malicious intent to access, breach or
exploit data in the database
Analyzing
Security Approach – How Connections work
Connection is redirected
SQL Auditing
via TDS protocol servername.database.windows.net
TCP, Port: 1433
TDS <3.2 – JDBC
S S
P
servername.database.secure.windows.net
S TCP, Port: 1433
Security Approach - SQL Auditing
Audit Records Example
Security Approach - SQL Auditing
Setup
Security Approach - SQL Auditing
Data Captured Visualization
24
Security Approach - SQL Auditing
Threat Detection Example
Threat Detection detects anomalous database activities indicating
potential security threats to the database.
Other Security
Mechanisms
Other Security Mechanisms
Compliance Disaster Recovery
• 10 years for Long terms retention for PaaS
• Storage and the databases geo-replicated.
• FedRAMP - Government
• ISO
• HIPPA - Medical
• PCI - Payment High availability
• EU Model Clauses - Personal • 3 copies of your data PaaS and up to 16 copies of geo-
• UK G-Cloud - Public Sector replicated read-only.
Penetration Test
Replication
• Transactional Replication unidirectional
Microsoft Trust Center OnPremise -> IaaS
OnPremise, Iaas y Azure
• Data Sync*
Securing our Azure SQL
Database
Questions?
[email protected]
@jmjuradodiaz
[email protected]
@rocavalc
Securing our Azure SQL
Database