Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Implement a secure environment for a database service

Microsoft via Microsoft Learn

Overview

  • Module 1: Configure database authentication and authorization
  • After completing this module, you will be able to:

    • Learn about authentication options for Azure SQL Database
    • Create various security principals
    • Configure permissions within a SQL database
  • Module 2: Protect data in-transit and at rest
  • After completing this module, you will be able to:

    • Understand the data encryption options available in the various platforms
    • Configure encryption for data at rest and in transit
    • Implement object level encryption
    • Configure SQL Server to use Azure Key Vault
    • Understand the difference between database and instance firewalls in Azure SQL Database
    • Explore Secure Enclaves
  • Module 3: Implement compliance controls for sensitive data
  • After completing this module, you will be able to:

    • Plan and implement data classification in Azure SQL Database
    • Understand and configure Azure threat protection

Syllabus

  • Module 1: Configure database authentication and authorization
    • Introduction
    • Describe Active Directory and Azure Active Directory
    • Describe authentication and identities
    • Describe Security Principals
    • Describe database and object permissions
    • Explain execute as user
    • Explain the policy of least privilege
    • Exercise: Authorize Access to Azure SQL Database with Azure Active Directory
    • Knowledge check
    • Summary
  • Module 2: Protect data in-transit and at rest
    • Introduction
    • Describe the role of firewalls
    • Explain encryption at rest
    • Describe the role of Azure Key Vault in transparent data encryption
    • Explain object encryption and secure enclaves
    • Explain dynamic data masking
    • Exercise: Configure a server-based firewall rule using the Azure portal
    • Knowledge check
    • Summary
  • Module 3: Implement compliance controls for sensitive data
    • Introduction
    • Describe data classification
    • Describe advanced threat protection
    • Describe SQL injection
    • Exercise: Enable Microsoft Defender for SQL and Data Classification
    • Knowledge check
    • Summary

Reviews

Start your review of Implement a secure environment for a database service

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.