SlideShare a Scribd company logo
1 of 13
Download to read offline
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Access Azure SQL from Azure VMs through the Microsoft Azure backbone network
without the need for internet endpoints on the SQL Server
Securing your Azure SQL Server
Mitesh Chauhan
Why should we use service endpoints ?
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Access Azure SQL from Azure VMs through the Microsoft Azure backbone network
without the need for internet endpoints on the SQL Server.
• Neater way to access SQL from Azure VNET (No NAT device, load balancer or SQL public IP required)
• If using forced tunnelling, you can now access SQL Server directly
Notes
• Service endpoints are applied at the subnet level, consider this in your virtual network design
• VNET and SQL Server must be in the same region, can be in different subscriptions
• There can be many unique service endpoints per subnet
• Accessing SQL via service endpoints does NOT mean the SQL Server becomes part of your virtual network
SQL Database Server with Internet Endpoints
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
SQL Database Server with Service Endpoints
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Steps required for connecting SQL Server to Subnet
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
VNET
Create a service endpoint on your subnet
• Specify which service (SQL) in which region can access the Subnet
Azure SQL Server
Create SQL Server Firewall Rule to connect to service endpoint for the subnet.
• Specify which Service Endpoint in which vnet/ subnet to allow connections from.
Network Security Group (NSG = Layer 4 Firewall Rules)
Allow SQL traffic from desired region.
• Attach NSG to required subnet
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
1. Use NSGs to lock down access to only the SQL service and region required
We can select SQL or Storage for the service endpoint. We can then specify the service and the region in an NSG
Security Features available for your production databases / servers
2. Enable Auditing and Threat Detection
3. Databases are encrypted by default. Microsoft Manage the encryption and keys.
• Option to Bring Your Own Keys is also available.
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Use Dynamic Data Masking to protect personal data – Create Rules
Enable dynamic data masking on your columns in your tables that have personally identifiable information.
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Use Dynamic Data Masking to protect personal data - Results
Any non admin accounts (that have not been excluded) will only see masked data.
Example
Masking rule on customertable,
EmailAddress Column
RESULT > > >
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Subnet View
• One service endpoint created
• Service endpoint allows access FROM selected Azure SQL
Services
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
NSG Inbound Firewall Rules View
• Rules are applied to all VMs in the subnet the NSG is attached to
• Rule 110 = Known IP address has RDP access
• Rule 200 = Allow access FROM the SQL Service running in the Azure East US Region
• No Outbound rules configured (default is to allow all outbound traffic).
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Azure SQL Server Firewall Rules View
• Access to all Azure Services switched Off
• No Internet endpoint rules configured
• (client IP address shown for info only)
• Subnet with the service endpoint Selected
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
SQL Server Security Settings View
• Auditing and Threat Detection Enabled
• Notification Email Set
• Database Encryption Enabled (by default) with Microsoft Managed Keys.
Microsoft Source Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
• Use Virtual Network service endpoints and rules for Azure SQL Database
• https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview
• Virtual Network Service Endpoints
• https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview#key-benefits

More Related Content

What's hot

SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconf
rustd
 
Dnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforussoDnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforusso
DotNetCampus
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
Non Intanon
 

What's hot (13)

SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconf
 
Dnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforussoDnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforusso
 
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
 
Sql injection
Sql injectionSql injection
Sql injection
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security development
 
Rc2010 alt architecture
Rc2010 alt architectureRc2010 alt architecture
Rc2010 alt architecture
 
What's new in visual studio 2013
What's new in visual studio 2013What's new in visual studio 2013
What's new in visual studio 2013
 
Introduction to lightning components
Introduction to lightning componentsIntroduction to lightning components
Introduction to lightning components
 
SQL Server: Security
SQL Server: SecuritySQL Server: Security
SQL Server: Security
 

Similar to Securing Azure Sql Server

24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
SpanishPASSVC
 
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure PresentationMicrosoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft Private Cloud
 

Similar to Securing Azure Sql Server (20)

A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
 
AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013
 
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Azure privatelink
Azure privatelinkAzure privatelink
Azure privatelink
 
New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014
 
IDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudIDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid Cloud
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
 
Secure your Azure Web App 2019
Secure your Azure Web App 2019Secure your Azure Web App 2019
Secure your Azure Web App 2019
 
Securing your data with Azure SQL DB
Securing your data with Azure SQL DBSecuring your data with Azure SQL DB
Securing your data with Azure SQL DB
 
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
 
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS CloudAWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
 
Data ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptxData ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptx
 
Working with azure database services platform
Working with azure database services platformWorking with azure database services platform
Working with azure database services platform
 
Azure service fabric overview
Azure service fabric overviewAzure service fabric overview
Azure service fabric overview
 
Microsoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern WebsitesMicrosoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern Websites
 
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure PresentationMicrosoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
 
Microsoft SQL Azure - Developing And Deploying With SQL Azure Whitepaper
Microsoft SQL Azure - Developing And Deploying With SQL Azure WhitepaperMicrosoft SQL Azure - Developing And Deploying With SQL Azure Whitepaper
Microsoft SQL Azure - Developing And Deploying With SQL Azure Whitepaper
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Securing Azure Sql Server

  • 1. Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Access Azure SQL from Azure VMs through the Microsoft Azure backbone network without the need for internet endpoints on the SQL Server Securing your Azure SQL Server Mitesh Chauhan
  • 2. Why should we use service endpoints ? Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Access Azure SQL from Azure VMs through the Microsoft Azure backbone network without the need for internet endpoints on the SQL Server. • Neater way to access SQL from Azure VNET (No NAT device, load balancer or SQL public IP required) • If using forced tunnelling, you can now access SQL Server directly Notes • Service endpoints are applied at the subnet level, consider this in your virtual network design • VNET and SQL Server must be in the same region, can be in different subscriptions • There can be many unique service endpoints per subnet • Accessing SQL via service endpoints does NOT mean the SQL Server becomes part of your virtual network
  • 3. SQL Database Server with Internet Endpoints Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com
  • 4. SQL Database Server with Service Endpoints Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com
  • 5. Steps required for connecting SQL Server to Subnet Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com VNET Create a service endpoint on your subnet • Specify which service (SQL) in which region can access the Subnet Azure SQL Server Create SQL Server Firewall Rule to connect to service endpoint for the subnet. • Specify which Service Endpoint in which vnet/ subnet to allow connections from. Network Security Group (NSG = Layer 4 Firewall Rules) Allow SQL traffic from desired region. • Attach NSG to required subnet
  • 6. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com 1. Use NSGs to lock down access to only the SQL service and region required We can select SQL or Storage for the service endpoint. We can then specify the service and the region in an NSG Security Features available for your production databases / servers 2. Enable Auditing and Threat Detection 3. Databases are encrypted by default. Microsoft Manage the encryption and keys. • Option to Bring Your Own Keys is also available.
  • 7. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Use Dynamic Data Masking to protect personal data – Create Rules Enable dynamic data masking on your columns in your tables that have personally identifiable information.
  • 8. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Use Dynamic Data Masking to protect personal data - Results Any non admin accounts (that have not been excluded) will only see masked data. Example Masking rule on customertable, EmailAddress Column RESULT > > >
  • 9. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Subnet View • One service endpoint created • Service endpoint allows access FROM selected Azure SQL Services
  • 10. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com NSG Inbound Firewall Rules View • Rules are applied to all VMs in the subnet the NSG is attached to • Rule 110 = Known IP address has RDP access • Rule 200 = Allow access FROM the SQL Service running in the Azure East US Region • No Outbound rules configured (default is to allow all outbound traffic).
  • 11. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Azure SQL Server Firewall Rules View • Access to all Azure Services switched Off • No Internet endpoint rules configured • (client IP address shown for info only) • Subnet with the service endpoint Selected
  • 12. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com SQL Server Security Settings View • Auditing and Threat Detection Enabled • Notification Email Set • Database Encryption Enabled (by default) with Microsoft Managed Keys.
  • 13. Microsoft Source Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com • Use Virtual Network service endpoints and rules for Azure SQL Database • https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview • Virtual Network Service Endpoints • https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview#key-benefits