Webcast : Building a Successful Database Security Model

Presenter: Brian Kelley

You’re building a new application using SQL Server as a back-end and you want to ensure the data is as secure as possible. How do you leverage SQL Server’s security features, such as object permissions, ownership chaining, and security roles to build effective database security models?

In this webinar we’ll look at how to start with a set of requirements and develop a logical but complete model to protect the data for your application, including handling multiple tiers of access. We will cover what the best practices are and when they don’t apply. We’ll also consider how to grant access when SQL Server’s built-in encryption functions, keys, and certificates are used to handle your sensitive data requirements.

About K. Brian Kelley: K. Brian Kelley is a SQL Server author, columnist, and Microsoft MVP focusing primarily on SQL Server and Windows security. In addition to being a database administrator, he has served as an infrastructure and security architect encompassing solutions with Citrix, virtualization, and Active Directory. Brian is also a Certified Information Systems Auditor (CISA) and has been the head of a financial organization’s computer incident response team. Brian is active in the IT community having spoken at DevConnections, SQL Saturdays, code camps, and user groups. He is also the President of the Midlands PASS Chapter, a Professional Association for SQL Server Chapter located in Columbia, SC.

 

Topics : Cloud Databases,Database Compliance,Database Monitoring,Database Performance,Database Security,

Products : SQL Compliance Manager,SQL Diagnostic Manager for SQL Server,

Register for Free Webcast

Note: By filling and submitting this form you understand and agree that the use of IDERA’s website is subject to the General Website Terms of Use. Additional details regarding IDERA’s collection and use of your personal information, including information about access, retention, rectification, deletion, security, cross-border transfers and other topics, is available in the Privacy Policy.