Kerberos, named after the mythical three-headed dog guarding the gates of the underworld, is a security protocol that enables secure authentication in network environments. It offers a significant improvement over older protocols like NTLM by allowing the delegation of credentials across multiple machines, making it ideal for distributed computing environments.
Category: Security
Why SQL Server Provides Value for the Enterprise: A Comparative Look at PostgreSQL
Selecting the right database management system (DBMS) is a significant decision for any enterprise. Microsoft SQL Server and PostgreSQL are two leading options, each with distinct strengths. While PostgreSQL is appealing due to its open-source nature and lower initial costs, SQL Server offers several advantages that justify its higher price, particularly for large organizations with complex data needs.
The Application Role: Implementing Application Roles with SQL Server
A straightforward guide to implementing application roles in SQL Server, focusing on enhancing security and managing database permissions for applications. This guide covers the creation, activation, and management of application roles, ensuring applications have the necessary access while minimizing the risk of unauthorized actions. Learn about key concepts such as role activation, permission assignment, and reverting security contexts. Follow best practices to effectively use application roles and improve the overall security and manageability of your SQL Server databases.
SQL Auditing and Always On: Working Together
Maintaining continuous and consistent auditing is crucial for security, compliance, and troubleshooting. When working with SQL Server Always On Availability Groups, a failover event can pose significant challenges to your audit configurations and logs. This guide will help you navigate these challenges by outlining the key considerations and steps necessary to ensure that SQL Server auditing remains seamless during a failover.
Enterprise SQL Server Security: Best Practices and Strategies to Protect Your Data
Explore essential SQL Server security best practices for large enterprises. This blog covers encryption, access control, infrastructure security, threat detection, and compliance to enhance data protection, ensure regulatory adherence and more. Learn what more you can do to secure your critical production SQL Server environments.
Navigating the Changes in SQL Server 2022: A Guide to Server Alias Configuration
If you’re embarking on a fresh installation of SQL Server 2022, you might be in for a surprise. Gone are the familiar days of the SQL Server Native Client being a core component of SQL Server installations. This blog post will discuss the recent changes in SQL Server 2022 and how to navigate server alias configuration in this new landscape.
Capturing SQL Server Inventory with PowerShell
Maintaining an accurate and comprehensive inventory of your SQL Server environment is crucial for effective database management, ensuring security, and meeting compliance requirements. With PowerShell, database administrators can automate the collection of detailed information about SQL Server instances and databases, streamlining the inventory process. This blog post introduces a PowerShell script designed to efficiently gather SQL Server inventory data, separating instance-level information from database-specific details into two distinct reports.
Enhancing Data Durability with SQL Server’s REQUIRED SYNCHRONIZED SECONDARIES TO COMMIT Feature
SQL Server 2017 marked a significant advancement in high availability architectures by introducing the REQUIRED_SYNCHRONIZED_SECONDARIES_TO_COMMIT setting. This feature enhances data protection and integrity within Availability Groups (AGs) by meticulously controlling the transaction commit process across replicas. Its role has continued to be pivotal in subsequent releases, including SQL Server 2022, showcasing Microsoft’s commitment to robust data protection mechanisms.
Understanding the Implications of the TRUSTWORTHY Database Setting in SQL Server
As a SQL Server DBA, understanding the nuances of database settings is necessary for maintaining security and integrity. One such setting that often becomes a topic of discussion due to its significant impact on security is the TRUSTWORTHY database setting. The TRUSTWORTHY database setting in SQL Server is a configuration option that affects the security of certain database operations, particularly those involving code execution contexts. It plays a critical role in the security context of modules that use WITH EXECUTE AS, as well as CLR (Common Language Runtime) assemblies marked as EXTERNAL_ACCESS or UNSAFE.
Dynamic Data Masking (DDM) in SQL Server
Dynamic Data Masking (DDM) is an important security feature designed to protect sensitive information in database environments like SQL Server and Azure SQL Database. It works by masking sensitive data from non-privileged users, thus enhancing data security and compliance without altering the actual data. DDM operates by hiding sensitive data in query results, allowing only privileged users to view the unmasked data. It’s especially valuable in environments requiring data protection without compromising user experience.