chapter 1 configure data access and auditing · pdf filechapter 1 configure data access and...

14
© 2012 Microsoft Corporation. All Rights Reserved. Page 1 9/18/2017 CHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password

Upload: hathuy

Post on 05-Feb-2018

234 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 1 9/18/2017

C H A P T E R 1

Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password

Page 2: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 2 9/18/2017

LISTING 1-2 Implementing column-level encryption using a certificate

Page 3: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 3 9/18/2017

LISTING 1-3 Implementing column-level encryption using a certificate

Page 4: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 4 9/18/2017

LISTING 1-4 Implementing always encrypted

Page 5: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 5 9/18/2017

LISTING 1-5 Always encrypted powershell script

Page 6: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 6 9/18/2017

LISTING 1-6 Implementing transparent database encryption

LISTING 1-7 Backing up TDE certificates and keys

Page 7: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 7 9/18/2017

LISTING 1-8 Implementing database backup encryption

LISTING 1-9 Creating logins

Page 8: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 8 9/18/2017

LISTING 1-10 Creating and maintaining roles

LISTING 1-11 Creating and maintaining user-defined server roles

LISTING 1-12 Managing object level permissions

Page 9: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 9 9/18/2017

LISTING 1-13 Implementing row level security

Page 10: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 10 9/18/2017

Page 11: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 11 9/18/2017

Page 12: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 12 9/18/2017

LISTING 1-14 Implementing DDM

Page 13: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 13 9/18/2017

LISTING 1-15 Implementing auditing

Page 14: CHAPTER 1 Configure data access and auditing · PDF fileCHAPTER 1 Configure data access and auditing LISTING 1-1 Implementing column-level encryption using a password ... LISTING 1-15

© 2012 Microsoft Corporation. All Rights Reserved. Page 14 9/18/2017