SlideShare a Scribd company logo
Security & Compliance



                                        Microsoft® SQL Server® 2008 R2 offers built-in
                                        security and compliance capabilities that help
                                        provide effective management of security feature
                                        configuration, strong authentication and access
                                        control, powerful encryption and key
                                        management capabilities, and enhanced auditing.


                                         PROTECT DATA
KEY FEATURES
                                         Help protect your data with a
   Use Policy-Based Management to
                                         database solution that is historically
    help manage and detect non-
                                         known for the lowest vulnerabilities*
    compliance with security polices
                                         across the major DBMS vendors.
    for data across the enterprise.
   Encrypt data without modifying       Take advantage of a built-in
    applications by using Transparent    cryptography hierarchy
    Data Encryption.
                                         Use the built-in cryptography
   Employ enterprise wide               hierarchy in SQL Server to create
    encryption solutions with            asymmetric keys, symmetric keys,               Transparent Data Encryption
    Extensible Key Management and        and certificates.
    Hardware Security Modules.                                                     Employ Extensible Key
   Implement high-performance,          Encrypt data transparently                Management
    granular auditing with SQL Server    Reduce the complexity of                  Consolidate your enterprise
    Audit.                               developing applications that require      encryption by using an Enterprise
COMPLIANCE &                             encrypted data by performing all          Key Management system. Separate
CERTIFICATIONS                           encryption transparently at the           your data from the keys using
                                         database level through a security         Hardware Security Modules to store
   SQL Server 2008 Enterprise                                                     the keys in separate hardware.
                                         enhanced database encryption key
    edition has completed an IT          (DEK). Enable application                 Simplify key management by using
    security evaluation at the Basic     developers to access encrypted            specialist systems. Currently the
    Assurance Level EAL1+, EAL4+ is      data without changing existing            following HSM vendors support SQL
    in progress and recognized by US     applications.                             Server EKM; SafeNet,
    government bodies.                                                             Thales/nCipher, and Arx Inc.
   SQL Server 2008 has been
    audited for Payment Card Industry                                              Sign code modules
    (PCI) Data Security Standard                                                   Use a key or certificate to add a
    (DSS) Compliance.                                                              digital signature to code modules
   SQL Server 2008 has been                                                       such as stored procedures and
    audited for HIPAA Compliance.                                                  functions, and then associate
                                                                                   additional permissions to the



*nist.org                               SQL Server 2008 R2 Security & Compliance
signature for the duration of the                            Simplify permission management                                           Securing the surface area
                                                                                                                                            with policies
code module execution.                                       Use schemas to simplify and                                   Automatically apply software
                                                             improve flexibility of large                                  updates
CONTROL ACCESS
                                                             databases. Grant permissions to a
Control access to your data by                                                                                             Use Windows Update to
                                                             schema to grant permissions to
managing authentication and                                                                                                automatically apply SQL
                                                             every object contained in the
authorization effectively and by                                                                                           Server 2008 patches. Reduce
                                                             schema and every object created in
providing access to only users who                                                                                         threats caused by known software
                                                             that schema in the future.
need it.                                                                                                                   vulnerabilities.

Enforce password policies                                                                                                  Enhanced auditing with the SQL
                                                                                                                           Server Audit
Automatically apply the password
policies of Microsoft Windows®                                                                                             Define audits to automatically record
Server 2003 (or later) to enforce                                                                                          activity in log files, the Windows
minimum password length, proper                                                                                            Application log, or the Windows
character combinations, and                                                                                                Security log. Take full control of
regularly-changing passwords even                                                                                          auditing by creating audit
when using SQL Server logins.                                                                                              specifications to determine the
                                                                                                                           server and database actions to
Use roles and proxy accounts                                                                                               include in the audit.
                                                                              Schema creation
Use msdb database fixed database
roles to increase control over Agent                         ENSURE COMPLIANCE
services. Use multiple proxy
accounts to make execution of a                              Ensure compliance with company
SQL Server Integration Services                              policies and/or government
(SSIS) package as a job step more                            regulations like HIPAA and PCI.
secure.
                                                             Configure the surface area with
Provide security enhanced
                                                             automated Policy-Based
metadata access
                                                             Management
Provide security-enhanced access
                                                             Use Policy-Based Management to
to metadata by using catalog views,
                                                             help ensure compliance with
enabling users to view metadata                                                                                                             All Action audit
                                                             configuration policies for servers,
only for those objects that they have
                                                             databases, and database objects
access to.                                                                                                                 Create custom auditing solutions
                                                             across the enterprise. Help reduce
                                                                                                                           with DDL triggers
Enhance security features with                               your exposure to security threats by
                                                             using the new Surface Area facet to                           Capture and audit data definition
execution context                                                                                                          language (DDL) activities by using
                                                             control active services and features.
Mark modules with an execution                                                                                             triggers. Extend triggers to respond
context so that statements within the                                                                                      to DDL events as well as data
module execute as a particular user                                                                                        manipulation language (DML)
instead of the calling user. Grant the                                                                                     events and log DDL events,
calling user permission to execute                                                                                         improving auditing and enhancing
the module, but use the permissions                                                                                        security.
of the execution context for
statements within the module.




This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real
company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. (Use this only if fictitious content appears.)

More Related Content

What's hot

Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
Symantec
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Banking at Ho Chi Minh city
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
System Center
System CenterSystem Center
System Center
Blauge
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
ITCamp
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
abelsonp
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
Eduardo Castro
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
nick_garrod
 
IronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-DatasheetIronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-DatasheetVishal Mittal
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
MarketingArrowECS_CZ
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudLai Yoong Seng
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Herman Arnedo
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
Array Networks
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Discover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active DirectoryDiscover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active Directory
Microsoft TechNet - Belgium and Luxembourg
 
Plm flex assist v1.4
Plm flex assist v1.4Plm flex assist v1.4
Plm flex assist v1.4plmflex
 

What's hot (20)

Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
System Center
System CenterSystem Center
System Center
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
IronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-DatasheetIronNetworks-MCE-Appliance-Gateway-Datasheet
IronNetworks-MCE-Appliance-Gateway-Datasheet
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Overview Of Microsoft Private Cloud
Overview Of Microsoft Private CloudOverview Of Microsoft Private Cloud
Overview Of Microsoft Private Cloud
 
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...Managing Mobility - Microsoft Enterprise Mobility -  Accelerate, Protec and M...
Managing Mobility - Microsoft Enterprise Mobility - Accelerate, Protec and M...
 
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education Microsoft System Center Configuration Manager for Education
Microsoft System Center Configuration Manager for Education
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Discover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active DirectoryDiscover what's new in Windows Server 2012 Active Directory
Discover what's new in Windows Server 2012 Active Directory
 
Plm flex assist v1.4
Plm flex assist v1.4Plm flex assist v1.4
Plm flex assist v1.4
 

Similar to Sql server 2008 r2 security datasheet

Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor adminsKlaudiia Jacome
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
Seguridad en SQL Server 2012
Seguridad en SQL Server 2012Seguridad en SQL Server 2012
Seguridad en SQL Server 2012
Juan Fabian
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
Aditya Bhuyan
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
Aditya Bhuyan
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 Highlights
Intergen
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
Amazon Web Services
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications guest879f38
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheetPaul Tompsett
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
Christian Frahm
 
Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013sqlserver.co.il
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
dotnetcode
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
s87j3
 
SQL Server R2 Sunumu
SQL Server R2 SunumuSQL Server R2 Sunumu
SQL Server R2 SunumuÇözümPARK
 
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 DatasheetMicrosoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft Private Cloud
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product OverviewIsmail Muhammad
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureguestea92ba
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services OlivierMichot
 

Similar to Sql server 2008 r2 security datasheet (20)

Sql server 2008 r2 security overviewfor admins
Sql server 2008 r2 security   overviewfor adminsSql server 2008 r2 security   overviewfor admins
Sql server 2008 r2 security overviewfor admins
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
Seguridad en SQL Server 2012
Seguridad en SQL Server 2012Seguridad en SQL Server 2012
Seguridad en SQL Server 2012
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
 
SQL Server 2008 Highlights
SQL Server 2008 HighlightsSQL Server 2008 Highlights
SQL Server 2008 Highlights
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
 
Secerno SQLagile datasheet
Secerno SQLagile datasheetSecerno SQLagile datasheet
Secerno SQLagile datasheet
 
Sustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS StandardSustainable Compliance For PCI DSS Standard
Sustainable Compliance For PCI DSS Standard
 
Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013Windows azure sql_database_security_isug012013
Windows azure sql_database_security_isug012013
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
 
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdfSecretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
 
SQL Server R2 Sunumu
SQL Server R2 SunumuSQL Server R2 Sunumu
SQL Server R2 Sunumu
 
Microsoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 DatasheetMicrosoft India – SQL Server 2008 R2 Datasheet
Microsoft India – SQL Server 2008 R2 Datasheet
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
 
XebiaLabs deployment automation brochure
XebiaLabs deployment automation brochureXebiaLabs deployment automation brochure
XebiaLabs deployment automation brochure
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 

More from Klaudiia Jacome

Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7Klaudiia Jacome
 
Applicationandmulti instances
Applicationandmulti instancesApplicationandmulti instances
Applicationandmulti instancesKlaudiia Jacome
 
Sql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheetSql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheetKlaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceKlaudiia Jacome
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data servicesKlaudiia Jacome
 
Sql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_finalSql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_finalKlaudiia Jacome
 
Sql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deckSql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deckKlaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceKlaudiia Jacome
 

More from Klaudiia Jacome (20)

Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7Aoutsourcing para capitulo 7
Aoutsourcing para capitulo 7
 
Si las cosas van mal
Si las cosas van malSi las cosas van mal
Si las cosas van mal
 
Analysis services
Analysis  servicesAnalysis  services
Analysis services
 
Enterprise security
Enterprise securityEnterprise security
Enterprise security
 
Performance
PerformancePerformance
Performance
 
Performance
PerformancePerformance
Performance
 
Enterprise security
Enterprise securityEnterprise security
Enterprise security
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Managemen tools
Managemen toolsManagemen tools
Managemen tools
 
Managemen tolos
Managemen tolosManagemen tolos
Managemen tolos
 
Datos espaciales
Datos espacialesDatos espaciales
Datos espaciales
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Avances analticos
Avances analticosAvances analticos
Avances analticos
 
Applicationandmulti instances
Applicationandmulti instancesApplicationandmulti instances
Applicationandmulti instances
 
Sql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheetSql server2008 r2_mds_datasheet
Sql server2008 r2_mds_datasheet
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data services
 
Sql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_finalSql server2008 r2_bi_datasheet_final
Sql server2008 r2_bi_datasheet_final
 
Sql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deckSql server 2008 business intelligence tdm deck
Sql server 2008 business intelligence tdm deck
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Sql server 2008 r2 security datasheet

  • 1. Security & Compliance Microsoft® SQL Server® 2008 R2 offers built-in security and compliance capabilities that help provide effective management of security feature configuration, strong authentication and access control, powerful encryption and key management capabilities, and enhanced auditing. PROTECT DATA KEY FEATURES Help protect your data with a  Use Policy-Based Management to database solution that is historically help manage and detect non- known for the lowest vulnerabilities* compliance with security polices across the major DBMS vendors. for data across the enterprise.  Encrypt data without modifying Take advantage of a built-in applications by using Transparent cryptography hierarchy Data Encryption. Use the built-in cryptography  Employ enterprise wide hierarchy in SQL Server to create encryption solutions with asymmetric keys, symmetric keys, Transparent Data Encryption Extensible Key Management and and certificates. Hardware Security Modules. Employ Extensible Key  Implement high-performance, Encrypt data transparently Management granular auditing with SQL Server Reduce the complexity of Consolidate your enterprise Audit. developing applications that require encryption by using an Enterprise COMPLIANCE & encrypted data by performing all Key Management system. Separate CERTIFICATIONS encryption transparently at the your data from the keys using database level through a security Hardware Security Modules to store  SQL Server 2008 Enterprise the keys in separate hardware. enhanced database encryption key edition has completed an IT (DEK). Enable application Simplify key management by using security evaluation at the Basic developers to access encrypted specialist systems. Currently the Assurance Level EAL1+, EAL4+ is data without changing existing following HSM vendors support SQL in progress and recognized by US applications. Server EKM; SafeNet, government bodies. Thales/nCipher, and Arx Inc.  SQL Server 2008 has been audited for Payment Card Industry Sign code modules (PCI) Data Security Standard Use a key or certificate to add a (DSS) Compliance. digital signature to code modules  SQL Server 2008 has been such as stored procedures and audited for HIPAA Compliance. functions, and then associate additional permissions to the *nist.org SQL Server 2008 R2 Security & Compliance
  • 2. signature for the duration of the Simplify permission management Securing the surface area with policies code module execution. Use schemas to simplify and Automatically apply software improve flexibility of large updates CONTROL ACCESS databases. Grant permissions to a Control access to your data by Use Windows Update to schema to grant permissions to managing authentication and automatically apply SQL every object contained in the authorization effectively and by Server 2008 patches. Reduce schema and every object created in providing access to only users who threats caused by known software that schema in the future. need it. vulnerabilities. Enforce password policies Enhanced auditing with the SQL Server Audit Automatically apply the password policies of Microsoft Windows® Define audits to automatically record Server 2003 (or later) to enforce activity in log files, the Windows minimum password length, proper Application log, or the Windows character combinations, and Security log. Take full control of regularly-changing passwords even auditing by creating audit when using SQL Server logins. specifications to determine the server and database actions to Use roles and proxy accounts include in the audit. Schema creation Use msdb database fixed database roles to increase control over Agent ENSURE COMPLIANCE services. Use multiple proxy accounts to make execution of a Ensure compliance with company SQL Server Integration Services policies and/or government (SSIS) package as a job step more regulations like HIPAA and PCI. secure. Configure the surface area with Provide security enhanced automated Policy-Based metadata access Management Provide security-enhanced access Use Policy-Based Management to to metadata by using catalog views, help ensure compliance with enabling users to view metadata All Action audit configuration policies for servers, only for those objects that they have databases, and database objects access to. Create custom auditing solutions across the enterprise. Help reduce with DDL triggers Enhance security features with your exposure to security threats by using the new Surface Area facet to Capture and audit data definition execution context language (DDL) activities by using control active services and features. Mark modules with an execution triggers. Extend triggers to respond context so that statements within the to DDL events as well as data module execute as a particular user manipulation language (DML) instead of the calling user. Grant the events and log DDL events, calling user permission to execute improving auditing and enhancing the module, but use the permissions security. of the execution context for statements within the module. This data sheet is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. (Use this only if fictitious content appears.)