Stairway to SQL Server Security

Stairway to SQL Server Security Level 5: Schemas and Security

In this stairway level you’ll learn how you can give principals access to groups of objects by assigning permissions on schemas instead of individual tables, code modules, and other objects. You’ll also learn about the benefits of user-schema separation and how it can increase object security, and how using default schemas for users and groups can simplify object access management and security.

4 (1)

2019-04-24 (first published: )

6,511 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 11: Auditing

By defining server- and database-level audits, you can record just about any kind of event that occurs in SQL Server, which can be an invaluable source of security troubleshooting and forensic information when security breaches occur. In this stairway level you’ll learn how to define the various audit specification objects, how to capture audit data, and how to explore and use the data.

2018-12-12 (first published: )

3,845 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 10: Row-Level Security

Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.

2015-07-29

4,102 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 9: Transparent Data Encryption

Even an otherwise well-secured database is susceptible to attack if an attacker is able to get access to the disk files that comprise the database. Cell-level encryption can protect some of the data, but for complete protection against this kind of attack it is necessary to encrypt the files and not just the data. That is exactly what Transparent Data Encryption (TDE) does, and in this stairway level you'll learn what TDE does, how it works, and how to make use of it to protect your database files.

2015-06-03

3,835 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 8: Data Encryption

This stairway level will explore data protection through encryption, both when the data is in motion across the network or in memory and at rest in a table. You’ll learn about the encryption key hierarchy and the various kinds of keys you can use to encrypt data, as well as how you can manage the keys or let SQL Server do it for you.

2015-04-15

4,520 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 7: Security Across Databases with Cross-Database Ownership Chaining

Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.

2015-04-08

3,315 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.

2015-02-04

3,308 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 4: Permissions

A permission gives a principal access to an object to perform certain actions on or with the object. SQL Server has a mind-numbingly huge number of permissions that you can grant to a principal, and you can even deny or revoke those permissions. This sounds a bit complicated, but by the end of this stairway level you’ll understand how SQL Server permissions work and how you can exert very granular control over object creation, data access, and other types of actions on database and server objects.

2014-10-15

4,891 reads

Stairway to SQL Server Security

Stairway to SQL Server Security Level 2: Authentication

Authentication is the first step in letting a principal get access to an instance of SQL Server, essentially resolving the question, Who are you? In this stairway level you’ll learn about the basics of authentication and the authentication options available. This level covers logins and users and you’ll learn about the password policies that can help strengthen SQL Server authentication.

2014-06-18

5,399 reads

Blogs

Understanding Columnstore Indexes in SQL Server Part 3

By

My last two blogs were on understanding columnstore and creating columnstore indexes. In this...

Is it just me or does msdb feel a lot like a user database?

By

When you think of system databases, tables, etc there are a number of things...

SQL Server 2019 Query Store And SSMS

By

While not specific to SQL Server 2019 (I was using this version to do...

Read the latest Blogs

Forums

The AI Manager

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The AI Manager

Non-yielding scheduler error in SQL-2014 with SP-3

By N_Muller

Every once in a while we receive a "non-yielding scheduler" error in SQL Server...

Db went to suspect in AG

By ramyours2003

One of my db went to suspect in secondary replica  when i checked in ...

Visit the forum

Ask SSC

SQL Server Q&A from the SQLServerCentral community

Get answers