SQL Server data security from the bottom up
2020TL; DR
Every day we work with data that is critical to our company. It must be kept secure, available and reliable or we face legal penalties or the collapse of the business. As SQL Developers and DBAs, how do we prevent this?
Session Details
The data we work with every day needs to be kept secure in line with compliancy regulations or with its critcality to the Businesss. Any breaches in the Confidentiality, Integrity or Availability of that data could result in prosection or financial losses.
In this one day workshop we'll be looking at SQL Server security from the ground up. Starting with how the business needs to define it's security requirements and responsibilities. Covering how to setup and configure your SQL Server instances, both on premise and in the cloud using IaaS and PaaS. Exploring how you should you be working with confidential data as a DBA or Developer; do you need or want to see the data, do users need to see everything, is encryption always the best option, are your backups secure, can the right people manage data access, can you have too much security, why isn't the IT team the data owner?
We'll be covering the why as well as the how, referencing the legal guidelines and the ISC2 recommend framework to allow you to make informed decisions and to understand where technical solutions sit in the larger picture.
In this one day workshop we'll be looking at SQL Server security from the ground up. Starting with how the business needs to define it's security requirements and responsibilities. Covering how to setup and configure your SQL Server instances, both on premise and in the cloud using IaaS and PaaS. Exploring how you should you be working with confidential data as a DBA or Developer; do you need or want to see the data, do users need to see everything, is encryption always the best option, are your backups secure, can the right people manage data access, can you have too much security, why isn't the IT team the data owner?
We'll be covering the why as well as the how, referencing the legal guidelines and the ISC2 recommend framework to allow you to make informed decisions and to understand where technical solutions sit in the larger picture.
3 things you'll get out of this session
Speakers
Stuart Moore's previous sessions
Embedding SQL security practices in your pipelines
Automate checking your database security model
SQL Server Secure Development Patterns
The database is at the heart of your organisation's applications. If you can embed secure practices here, then it will flow througthe rest of your application stack.