Bad IT People
What happens when you have bad IT people working in your company? Steve Jones says that they always will be around, but we might not want to enable them to continue in this business when we find them.
2011-03-02
2,128 reads
What happens when you have bad IT people working in your company? Steve Jones says that they always will be around, but we might not want to enable them to continue in this business when we find them.
2011-03-02
2,128 reads
We ran into a case recently where we had the logins and users scripted out on my SQL Server instances, but we didn't have the fixed database roles for a critical database. As a result, our recovery efforts were only partially successful. We ended up trying to figure out what the database role memberships were for that database we recovered but we'd like not to be in that situation again. Is there an easy way to do this?
2011-02-23
3,104 reads
To easily manage the permissions in SQL Server databases, Microsoft has provided several roles in SQL Server which are security principals that group other principals.
2011-02-21
3,665 reads
Day 3 of Security Week at SQL University is now in session. You're implementing a third party solution and you...
2011-02-11
2,330 reads
SQL Server stores all login information on security catalog system tables. By querying the system tables, SQL statements can be re-generated to recover logins, including password, default schema/database, server/database role assignments, and object level permissions. A comprehensive permission report can also be produced by combining information from the system metadata.
2011-02-08
5,514 reads
Welcome to this semester's security week at SQL University. In previous semesters we've covered the technical aspects of SQL Server...
2011-02-08
1,933 reads
Steve Jones thinks that security will be one of the biggest impediments to the adoption of cloud computing might be the security issues and hacking targets it provides.
2011-02-03
289 reads
Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.
2013-10-11 (first published: 2011-02-02)
17,028 reads
The growth of ETL processes and secondary systems for reporting, decision support and other analysis creates an issue. Steve Jones points out that we ought to be remembering that security needs to be applied to data, not just systems.
2011-01-17
229 reads
Do you know what to do in case of a data breach? Steve Jones talks about the importance of having a "runbook" for security that covers the same types of things you might need to know for disaster recovery.
2011-01-05
145 reads
By Steve Jones
A customer recently wanted to know if any of their instances were too old...
A reader of one of my previous posts pointed out that the legend order...
Please, let me reiterate: The only valid test of a backup is a restore....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers