SQL Server Security

Azure SQL And Security Best Practices

Updated
8 min read
Written by
Mark Varnas

Microsoft is grouping all the options for SQL running in the Azure platform into one portfolio. A family of managed products, making it easier to see them and choose the best for your needs.

Cloud computing requires new security paradigms unfamiliar to many application users, database administrators, and programmers. When it comes to Azure SQL Security, where do you begin?

Azure can be very different from any other data center. While Azure helps secure your business assets, a great deal of responsibility is shared and requires customers to do their part.

In this article, we will see Azure Security best practices. If you are moving toward cloud adoption, you need to be aware of what you need to do to enhance security measures.

Control the database and application access

Centralize the identities management using the Azure Active Directory Authentication (Azure AD):

Enable Azure multi-factor authentication and minimize the use of password-based authentication

MFA is an authentication method that requires users to ensure through multiple ways that they are who they claim to be.

  • Activate Conditional Access in Azure AD (requires Premium subscription).
  • Use an Azure AD integrated authentication that eliminates the use of passwords.
  • Use cert-based authentication for an application.
  • If avoiding passwords or secrets aren’t possible, store user passwords and application secrets in Azure Key Vault and manage access through Key Vault access policies.

Protect sensitive data using encryption

Apply encryption protocols to protect your data between your client and server (in-transit), and when it is persisted in the database, log, and backup files (in-rest).

  • If you are in a SQL Managed instance restoring a database from an on-premises server that doesn’t have Transparent Database Encryption (TDE) enabled, you will need to allow it manually. Otherwise, TDE is enabled by default for any database created after 2017 in Azure SQL.
  • Don’t store any data that requires encryption in the master database. This database can not be encrypted with TDE.
  • Use Always Encrypted to ensure sensitive data isn’t exposed in plaintext, but do not use it as a substitute to encrypt data at rest (TDE) or in transit (SSL/TLS). Microsoft recommends it in conjunction with other security layers.
  • Minimize performance and functionality impact using Always encrypted only on sensitive data.
  • Ensure that client machines and applications connecting to Azure SQL Database and SQL Managed Instance are using Transport Layer Security (TLS). Prevent clients with well-known vulnerabilities from connecting to Azure SQL (for example, using older TLS protocols and cipher suites).

Implement network access controls

Minimize the number of features that a malicious user can attack, restricting access to Azure SQL Database and SQL Managed Instance.

Protect databases against attacks

To ensure your databases’ security, enable tools to detect and respond to threats as quickly as possible.

Audit your databases periodically

Auditing helps you monitor unauthorized activities, vulnerabilities in access permissions or configurations, and maintain regulatory compliance. The specific audits you should enable depends on your data use and what compliance standards apply to your data.

Ensure that the databases are configured to meet security best practices

Enable SQL Vulnerability Assessment (VA) to scan your database for security issues periodically automatically.

It can help you identify misconfigurations, unprotected data, and excessive permissions at database and server levels.

For any vulnerabilities found, evaluate the drift from the previous scan result and determine if the check should be resolved.

Is your company ready to implement the Azure SQL Securities?

Azure provides many built-in security features, but not all of the security features are automatic. In fact, many require configuration, and not all requirements apply to all environments.

Remember that Azure SQL is a dynamic platform. Be sure to keep abreast of new changes and apply necessary security adjustments continually—the more current your security operation, the better your posture.

Speak with a SQL Expert

In just 30 minutes, we will show you how we can eliminate your SQL Server headaches and provide 
operational peace of mind

Article by
Mark Varnas
Founder | CEO | SQL Veteran
Hey, I'm Mark, one of the guys behind Red9. I make a living performance tuning SQL Servers and making them more stable.

Leave a Comment

Discover More

SQL Server Health Check SQL Server Migrations & Upgrades SQL Server Performance Tuning SQL Server Security SQL Server Tips

Discover what clients are saying about Red9

Red9 has incredible expertise both in SQL migration and performance tuning.

The biggest benefit has been performance gains and tuning associated with migrating to AWS and a newer version of SQL Server with Always On clustering. Red9 was integral to this process. The deep knowledge of MSSQL and combined experience of Red9 have been a huge asset during a difficult migration. Red9 found inefficient indexes and performance bottlenecks that improved latency by over 400%.

Rich Staats 5 stars
Rich Staats
Cloud Engineer
MetalToad

Always willing to go an extra mile

Working with Red9 DBAs has been a pleasure. They are great team players and have an expert knowledge of SQL Server database administration. And are always willing to go the extra mile to get the project done.
5 stars
Evelyn A.
Sr. Database Administrator

Boosts server health and efficiency for enhanced customer satisfaction

Since adding Red9 to the reporting and DataWarehousing team, Red9 has done a good job coming up to speed on our environments and helping ensure we continue to meet our customer's needs. Red9 has taken ownership of our servers ensuring they remain healthy by monitoring and tuning inefficient queries.
5 stars
Andrew F.
Datawarehousing Manager
See more testimonials