Join Pete Zerger for an in-depth discussion in this video Using row-level security, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Narrator] Row level security in SQL Server 2016 and newer…enables us to control access to rows in a database table…based on the characteristics…of the user executing the query,…like a group membership or execution contact,…for example, am I a user querying directly or is it…a middle tier application or service issuing the query?…We'll start by logging in to our SQL Server…and we'll open SQL Server Management Studio…and then our exercise file.…
We're going to quickly walk through a scenario…with Kineteco Finance…with some finance users who access a database,…but who shouldn't all have…the same level of visibility into financial data.…You should have access to this sample code…in the downloadable exercise files…that come with this course.…So first we'll create some account that will demonstrate…the different access capabilities.…The logins in this case will be…for the financial analysts and their director.…
So I'll just run a handful of create user commands…and now we have our users.…And now we'll create a table…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection