Geek Sync Webcast : Building a Successful Database Security Model
You’re building a new application using SQL Server as a back-end and you want to ensure the data is as secure as possible. How do you leverage SQL Server’s security features, such as object permissions, ownership chaining, and security roles to build an effective security model within the database?
In this webinar we’ll look at how to start with a set of requirements and develop a logical but complete model to protect the data for your application, including handling multiple tiers of access. We will cover what the best practices are and when they don’t apply. We’ll also consider how to grant access when SQL Server’s built-in encryption functions, keys, and certificates are used to handle your sensitive data requirements.
K. Brian Kelley is a SQL Server author, columnist, and Microsoft MVP focusing primarily on SQL Server and Windows security. In addition to being a database administrator, he has served as an infrastructure and security architect encompassing solutions with Citrix, virtualization, and Active Directory. Brian is also a Certified Information Systems Auditor (CISA) and has been the head of a financial organization’s computer incident response team. Brian is active in the IT community having spoken at DevConnections, SQL Saturdays, code camps, and user groups. He is also the President of the Midlands PASS Chapter, a Professional Association for SQL Server Chapter located in Columbia, SC.
Monitor, audit and alert on SQL Server changes
- Audit sensitive data to see who did what, when, where, and how
- Monitor and alert on suspicious activity to detect and track problems
- Satisfy audits for multiple industry regulatory requirements
- Select from over 25 pre-defined compliance reports and create custom views
- Lightweight data collection agent minimizes server impact