SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.… Read more
Database table constraints such as foreign keys and default values ensure reliability of the data. In this article, Phil Factor demonstrates a way to find any data that breaks the build so it can be corrected before deployment.… Read more
According to Microsoft, DevOps is “the union of people, process, and products to enable continuous delivery of value to our end users.” The definition doesn’t mention any frameworks or specific tools, and it’s more about communication and culture than any technology. That said, automation and tooling are critical components of DevOps as it helps organizations … Read more
Protecting data is not easy, but it is critical. In this article, David Poole discusses database security and the behaviors needed to build secure systems.… Read more
The year is 1999, somewhere in Cambridge, UK. Kathi, a member of the Data-Philes team, is reading a memo sent from her manager. The memo talks about someone who disrupted a project management meeting in London. He claims he is from 20 years in the future. Chris walks in. Chris: Kathi, have you seen the … Read more
Back when I was working on a master’s degree, one of our professors told us a story about a colleague who learned how to navigate the Unix system. She was so thrilled about learning this new skill that, in her exuberance, she stumbled upon some hidden human resource files containing confidential information. Eventually, an administrator … Read more
Robert Sheldon explains the DevOps Application Delivery Pipeline and some of the terms such as Continuous Integration and Continuous Delivery. … Read more
Many organisations still run their companies on SQL Server 2008 or 2008 R2. There are many reasons to upgrade, but the most pressing reason is that extended support has run out. In this article, Brian Kelley explains what this means, tells you about some of the features you’ll gain if you upgrade, and provides some options. … Read more
A good day for a database administrator (DBA) is a lot like a good airline flight. A lot of excitement in either situation is bad. In a perfect world, a DBA will be productive and not spending most of their time “putting out fires.” (And fires are never a good idea on a flight!) DBAs … Read more
SQL Server contains many built-in views and functions that can be used to understand what is going on “under the hood,” and security is no exception. In this article, Robert Sheldon explains the security related catalogue views, dynamic management views, and system functions.… Read more
If you have worked with databases long enough, you probably have many frightening stories to tell about things that have gone awry on the job or problems that were difficult to solve. Accidently dropping a table or trying to fix an issue with the CIO standing right in your cube, repeatedly asking if you’ve fixed … Read more
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.… Read more
SQL Server supports partially contained databases. This gives you the option of adding database users with a password inside the database. This makes the database easier to move to another instance or participate in an Always On Availability Group. In this article, Robert Sheldon explains how to work with users in contained databases.… Read more
In this article, the second in the series, Robert Sheldon demonstrates how to manage the SQL Server security with granting permissions to users, logins, and groups.… Read more
In order to protect data and comply with regulations such as the GDPR and HIPAA, databases used by developers and testers must not contain private and sensitive data from production databases. To help DBAs protect data, Microsoft have released a new feature as part of SSMS called Static Data Masking. In this article, Greg Larsen demonstrates how to use this new feature.… Read more
Security is often considered the most important of a database administrator's responsibilities. SQL Server has many powerful features for security and protecting data, but planning and effort are required to properly implement them. In this article, the first of a series, Robert Sheldon reviews the many components available to secure and protect SQL Server databases. … Read more
SQL Server Audit is a powerful feature that can help you comply with regulations such as HIPAA and SOX, but it’s not easy to view the data collected. In this article, Robert Sheldon demonstrates how Power BI can be used to view and filter SQL Server Audit results.… Read more
Regulations may require that you audit exactly who does what in your databases. Robert Sheldon explains how SQL Server can help you meet those requirements with its built-in auditing capabilities.… Read more