Security

Technical Article

Managing the "Surface Area" of SQL Server 2005

  • Article

As every developer knows by now, Microsoft has focused renewed attention on security in recent product releases. One of the important concepts in this effort is surface area. Roughly speaking, a piece of software has a smaller surface area if there are fewer ways to attack it: fewer open ports, fewer APIs, fewer protocols, and so on. OSQL Server 2005 takes this concept to the next level by letting you explicitly manage the software's surface area.

2005-04-21

3,226 reads

External Article

SQL Server 2005 Security - Part 4

  • Article

In this article, we will conclude our coverage of security related changes in SQL Server 2005 Beta 2 (although we will continue discussion of improvements in other functionality areas throughout the reminder of this series). The topics we will focus on here are code and module signing, modifications of SQL Server Agent and SQL Profiler operations, as well as monitoring and auditing changes.

2005-03-23

2,123 reads

External Article

SQL Server 2000 Security - Part 6 - Ownership and Object Permissions

  • Article

We have described, so far, authorization based on a predefined fixed server (determining a set of SQL server-wide privileges) and database (applying to database objects and activities) roles. We have also discussed application roles, which makes the level of permissions independent of those assigned to a SQL Server login or a database user account. Now it is time to look into permissions from the point of view of database objects. There are two main factors that play a role in determining how access rights to them are evaluated - their ownership and custom permissions. We will discuss the first one of these topics in this article and will continue with the other one in the next installment of this series.

2005-03-22

2,349 reads

SQLServerCentral Article

Securing SQL Backups

  • Article

SQL Server does many things very well, but securing itself is not one of them. While securing your server requires some effort, there is an area that many people forget. Securing your backups! Brian Kelley, our resident security expert, brings some advice and ideas for ensuring your data will not be stolen.

You rated this post out of 5. Change rating

2005-03-21

9,014 reads

External Article

SQL Server 2005 Security - Part 3 Encryption

  • Article

After discussing authentication and authorization behavior of SQL Server 2005 Beta 2 in the previous two articles of this series, it is time to look into other security-related changes. In particular, we will focus on the freshly introduced native database encryption capabilities. While some encryption functionality existed in the previous versions (e.g. involving column encryption APIs within User Defined Functions or PWDENCRYPT password one-way hash function), it was relatively limited and rarely used. SQL Server 2005 provides significant improvements in this area.

2005-03-09

3,566 reads

External Article

SQL Server 2005 Security - Part 2 Authorization

  • Article

Following the discussion of new or enhanced authentication-related functionality in SQL Server 2005 Beta 2 in our previous article, we are shifting our focus to authorization features, which determine the level of access rights once the user's logon process is successfully completed. Among topics that will be covered here, are separation of user and schema, modifiable context of module execution, increased permission granularity, and improved catalog security.

2005-03-08

3,832 reads

Blogs

Down the Rabbit Hole: Dealing with Ad-Hoc Data Requests

By

"But I don’t want to go among mad people," Alice remarked."Oh, you can’t help...

Adding a Local Model to Ollama through the GUI

By

I saw some good reviews of the small gemma3 model in a few places...

Connect resiliently to SQL Server

By

 Why you should connect resiliently to SQL Server Transient failures happen — in the cloud...

Read the latest Blogs

Forums

Some query values change when query is run but not others. Why?

By water490

Hi everyone I have a 1000 line SQL query that is too long to...

using different credentials when debugging ssis

By stan

hi, now and then i want one connection in my ssis pkgs to use...

AlwaysON health check alerts

By Srinivas Merugu

Comments posted to this topic are about the item AlwaysON health check alerts

Visit the forum

Question of the Day

PWDCompare

What does the PWDCOMPARE function do?

See possible answers