chapter 1 configure data access and auditing · pdf filechapter 1 configure data access and...
TRANSCRIPT
© 2012 Microsoft Corporation. All Rights Reserved. Page 1 9/18/2017
C H A P T E R 1
Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password
© 2012 Microsoft Corporation. All Rights Reserved. Page 2 9/18/2017
LISTING 1-2 Implementing column-level encryption using a certificate
© 2012 Microsoft Corporation. All Rights Reserved. Page 3 9/18/2017
LISTING 1-3 Implementing column-level encryption using a certificate
© 2012 Microsoft Corporation. All Rights Reserved. Page 4 9/18/2017
LISTING 1-4 Implementing always encrypted
© 2012 Microsoft Corporation. All Rights Reserved. Page 5 9/18/2017
LISTING 1-5 Always encrypted powershell script
© 2012 Microsoft Corporation. All Rights Reserved. Page 6 9/18/2017
LISTING 1-6 Implementing transparent database encryption
LISTING 1-7 Backing up TDE certificates and keys
© 2012 Microsoft Corporation. All Rights Reserved. Page 7 9/18/2017
LISTING 1-8 Implementing database backup encryption
LISTING 1-9 Creating logins
© 2012 Microsoft Corporation. All Rights Reserved. Page 8 9/18/2017
LISTING 1-10 Creating and maintaining roles
LISTING 1-11 Creating and maintaining user-defined server roles
LISTING 1-12 Managing object level permissions
© 2012 Microsoft Corporation. All Rights Reserved. Page 9 9/18/2017
LISTING 1-13 Implementing row level security
© 2012 Microsoft Corporation. All Rights Reserved. Page 10 9/18/2017
© 2012 Microsoft Corporation. All Rights Reserved. Page 11 9/18/2017
© 2012 Microsoft Corporation. All Rights Reserved. Page 12 9/18/2017
LISTING 1-14 Implementing DDM
© 2012 Microsoft Corporation. All Rights Reserved. Page 13 9/18/2017
LISTING 1-15 Implementing auditing
© 2012 Microsoft Corporation. All Rights Reserved. Page 14 9/18/2017