SlideShare a Scribd company logo
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Access Azure SQL from Azure VMs through the Microsoft Azure backbone network
without the need for internet endpoints on the SQL Server
Securing your Azure SQL Server
Mitesh Chauhan
Why should we use service endpoints ?
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Access Azure SQL from Azure VMs through the Microsoft Azure backbone network
without the need for internet endpoints on the SQL Server.
• Neater way to access SQL from Azure VNET (No NAT device, load balancer or SQL public IP required)
• If using forced tunnelling, you can now access SQL Server directly
Notes
• Service endpoints are applied at the subnet level, consider this in your virtual network design
• VNET and SQL Server must be in the same region, can be in different subscriptions
• There can be many unique service endpoints per subnet
• Accessing SQL via service endpoints does NOT mean the SQL Server becomes part of your virtual network
SQL Database Server with Internet Endpoints
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
SQL Database Server with Service Endpoints
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Steps required for connecting SQL Server to Subnet
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
VNET
Create a service endpoint on your subnet
• Specify which service (SQL) in which region can access the Subnet
Azure SQL Server
Create SQL Server Firewall Rule to connect to service endpoint for the subnet.
• Specify which Service Endpoint in which vnet/ subnet to allow connections from.
Network Security Group (NSG = Layer 4 Firewall Rules)
Allow SQL traffic from desired region.
• Attach NSG to required subnet
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
1. Use NSGs to lock down access to only the SQL service and region required
We can select SQL or Storage for the service endpoint. We can then specify the service and the region in an NSG
Security Features available for your production databases / servers
2. Enable Auditing and Threat Detection
3. Databases are encrypted by default. Microsoft Manage the encryption and keys.
• Option to Bring Your Own Keys is also available.
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Use Dynamic Data Masking to protect personal data – Create Rules
Enable dynamic data masking on your columns in your tables that have personally identifiable information.
Tips To Secure Your SQL Server Further
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Use Dynamic Data Masking to protect personal data - Results
Any non admin accounts (that have not been excluded) will only see masked data.
Example
Masking rule on customertable,
EmailAddress Column
RESULT > > >
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Subnet View
• One service endpoint created
• Service endpoint allows access FROM selected Azure SQL
Services
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
NSG Inbound Firewall Rules View
• Rules are applied to all VMs in the subnet the NSG is attached to
• Rule 110 = Known IP address has RDP access
• Rule 200 = Allow access FROM the SQL Service running in the Azure East US Region
• No Outbound rules configured (default is to allow all outbound traffic).
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
Azure SQL Server Firewall Rules View
• Access to all Azure Services switched Off
• No Internet endpoint rules configured
• (client IP address shown for info only)
• Subnet with the service endpoint Selected
Additional Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
SQL Server Security Settings View
• Auditing and Threat Detection Enabled
• Notification Email Set
• Database Encryption Enabled (by default) with Microsoft Managed Keys.
Microsoft Source Reference
Mitesh.chauhan@outlook.com
@miteshchauhanuk
Miteshc.wordpress.com
• Use Virtual Network service endpoints and rules for Azure SQL Database
• https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview
• Virtual Network Service Endpoints
• https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview#key-benefits

More Related Content

What's hot

SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconfrustd
 
Dnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforussoDnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforussoDotNetCampus
 
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Shawn Ismail
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
Marwa Ahmad
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityNon Intanon
 
Sql injection
Sql injectionSql injection
Sql injection
Praneeth Perera
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
Randy Connolly
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security development
Synapseindiappsdevelopment
 
Rc2010 alt architecture
Rc2010 alt architectureRc2010 alt architecture
Rc2010 alt architecture
JasonOffutt
 
What's new in visual studio 2013
What's new in visual studio 2013What's new in visual studio 2013
What's new in visual studio 2013
Taiseer Joudeh
 
Introduction to lightning components
Introduction to lightning componentsIntroduction to lightning components
Introduction to lightning components
Madan Khichi
 
SQL Server: Security
SQL Server: SecuritySQL Server: Security
SQL Server: Security
LearnNowOnline
 

What's hot (13)

SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconf
 
Dnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforussoDnc2015 azure-microservizi-vforusso
Dnc2015 azure-microservizi-vforusso
 
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
Microsoft Azure Training - [3] Azure Accounts, Subscriptions and Admin Roles ...
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
 
Sql injection
Sql injectionSql injection
Sql injection
 
ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 
SynapseIndia dotnet website security development
SynapseIndia  dotnet website security developmentSynapseIndia  dotnet website security development
SynapseIndia dotnet website security development
 
Rc2010 alt architecture
Rc2010 alt architectureRc2010 alt architecture
Rc2010 alt architecture
 
What's new in visual studio 2013
What's new in visual studio 2013What's new in visual studio 2013
What's new in visual studio 2013
 
Introduction to lightning components
Introduction to lightning componentsIntroduction to lightning components
Introduction to lightning components
 
SQL Server: Security
SQL Server: SecuritySQL Server: Security
SQL Server: Security
 

Similar to Securing Azure Sql Server

A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
Antonios Chatzipavlis
 
AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013
Amazon Web Services
 
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
Amazon Web Services
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
Mohamed Tawfik
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
varanasisatyanvesh
 
Azure privatelink
Azure privatelinkAzure privatelink
Azure privatelink
Udaiappa Ramachandran
 
New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023
ThousandEyes
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
BizTalk360
 
Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014
Martin Njalale
 
IDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudIDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid Cloud
DATAVERSITY
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...SpanishPASSVC
 
Secure your Azure Web App 2019
Secure your Azure Web App 2019Secure your Azure Web App 2019
Secure your Azure Web App 2019
Frans Lytzen
 
Securing your data with Azure SQL DB
Securing your data with Azure SQL DBSecuring your data with Azure SQL DB
Securing your data with Azure SQL DB
Microsoft Tech Community
 
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
wwwally
 
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS CloudAWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
Amazon Web Services
 
Data ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptxData ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptx
Luis Beltran
 
Working with azure database services platform
Working with azure database services platformWorking with azure database services platform
Working with azure database services platform
ssuser79fc19
 
Azure service fabric overview
Azure service fabric overviewAzure service fabric overview
Azure service fabric overview
Baskar rao Dsn
 
Microsoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern WebsitesMicrosoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern Websites
WinWire Technologies Inc
 
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure PresentationMicrosoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure PresentationMicrosoft Private Cloud
 

Similar to Securing Azure Sql Server (20)

A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
 
AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013AWS Webcast - SharePoint 2013
AWS Webcast - SharePoint 2013
 
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
(DEV202) Under the Desk to the AWS Cloud with Windows PowerShell
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
Azure privatelink
Azure privatelinkAzure privatelink
Azure privatelink
 
New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023New ThousandEyes Product Features and Release Highlights: June 2023
New ThousandEyes Product Features and Release Highlights: June 2023
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014Deploying SharePoint on Microsoft Azure #spsnairobi2014
Deploying SharePoint on Microsoft Azure #spsnairobi2014
 
IDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid CloudIDERA Slides: Managing the Transition to Hybrid Cloud
IDERA Slides: Managing the Transition to Hybrid Cloud
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
 
Secure your Azure Web App 2019
Secure your Azure Web App 2019Secure your Azure Web App 2019
Secure your Azure Web App 2019
 
Securing your data with Azure SQL DB
Securing your data with Azure SQL DBSecuring your data with Azure SQL DB
Securing your data with Azure SQL DB
 
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
Haal de mist uit de monitoring van je cloud met System Center 2012 R2 Operati...
 
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS CloudAWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
AWS Webcast - Deploying Remote Desktop Gateway on the AWS Cloud
 
Data ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptxData ANZ - Using database for ML.NET.pptx
Data ANZ - Using database for ML.NET.pptx
 
Working with azure database services platform
Working with azure database services platformWorking with azure database services platform
Working with azure database services platform
 
Azure service fabric overview
Azure service fabric overviewAzure service fabric overview
Azure service fabric overview
 
Microsoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern WebsitesMicrosoft Azure: Deploy and Scale Modern Websites
Microsoft Azure: Deploy and Scale Modern Websites
 
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure PresentationMicrosoft SQL Azure - Building Applications Using SQL Azure Presentation
Microsoft SQL Azure - Building Applications Using SQL Azure Presentation
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Securing Azure Sql Server

  • 1. Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Access Azure SQL from Azure VMs through the Microsoft Azure backbone network without the need for internet endpoints on the SQL Server Securing your Azure SQL Server Mitesh Chauhan
  • 2. Why should we use service endpoints ? Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Access Azure SQL from Azure VMs through the Microsoft Azure backbone network without the need for internet endpoints on the SQL Server. • Neater way to access SQL from Azure VNET (No NAT device, load balancer or SQL public IP required) • If using forced tunnelling, you can now access SQL Server directly Notes • Service endpoints are applied at the subnet level, consider this in your virtual network design • VNET and SQL Server must be in the same region, can be in different subscriptions • There can be many unique service endpoints per subnet • Accessing SQL via service endpoints does NOT mean the SQL Server becomes part of your virtual network
  • 3. SQL Database Server with Internet Endpoints Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com
  • 4. SQL Database Server with Service Endpoints Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com
  • 5. Steps required for connecting SQL Server to Subnet Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com VNET Create a service endpoint on your subnet • Specify which service (SQL) in which region can access the Subnet Azure SQL Server Create SQL Server Firewall Rule to connect to service endpoint for the subnet. • Specify which Service Endpoint in which vnet/ subnet to allow connections from. Network Security Group (NSG = Layer 4 Firewall Rules) Allow SQL traffic from desired region. • Attach NSG to required subnet
  • 6. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com 1. Use NSGs to lock down access to only the SQL service and region required We can select SQL or Storage for the service endpoint. We can then specify the service and the region in an NSG Security Features available for your production databases / servers 2. Enable Auditing and Threat Detection 3. Databases are encrypted by default. Microsoft Manage the encryption and keys. • Option to Bring Your Own Keys is also available.
  • 7. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Use Dynamic Data Masking to protect personal data – Create Rules Enable dynamic data masking on your columns in your tables that have personally identifiable information.
  • 8. Tips To Secure Your SQL Server Further Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Use Dynamic Data Masking to protect personal data - Results Any non admin accounts (that have not been excluded) will only see masked data. Example Masking rule on customertable, EmailAddress Column RESULT > > >
  • 9. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Subnet View • One service endpoint created • Service endpoint allows access FROM selected Azure SQL Services
  • 10. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com NSG Inbound Firewall Rules View • Rules are applied to all VMs in the subnet the NSG is attached to • Rule 110 = Known IP address has RDP access • Rule 200 = Allow access FROM the SQL Service running in the Azure East US Region • No Outbound rules configured (default is to allow all outbound traffic).
  • 11. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com Azure SQL Server Firewall Rules View • Access to all Azure Services switched Off • No Internet endpoint rules configured • (client IP address shown for info only) • Subnet with the service endpoint Selected
  • 12. Additional Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com SQL Server Security Settings View • Auditing and Threat Detection Enabled • Notification Email Set • Database Encryption Enabled (by default) with Microsoft Managed Keys.
  • 13. Microsoft Source Reference Mitesh.chauhan@outlook.com @miteshchauhanuk Miteshc.wordpress.com • Use Virtual Network service endpoints and rules for Azure SQL Database • https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview • Virtual Network Service Endpoints • https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview#key-benefits