You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/2-design-solution-data-discovery-classification-microsoft-purview.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,12 +47,12 @@ Be granular and explicit when defining what's in scope for classification. The W
47
47
48
48
Start with these questions to define your scope:
49
49
50
-
1. What's the origin of data and information type?
51
-
2. What's the expected restriction based on access (public, regulatory, internal use)?
52
-
3. What's the data footprint—where is it stored and how long should it be retained?
53
-
4. Which architecture components interact with the data?
54
-
5. How does data move through the system?
55
-
6. What information is expected in audit reports?
50
+
- What's the origin of data and information type?
51
+
- What's the expected restriction based on access (public, regulatory, internal use)?
52
+
- What's the data footprint—where is it stored and how long should it be retained?
53
+
- Which architecture components interact with the data?
54
+
- How does data move through the system?
55
+
- What information is expected in audit reports?
56
56
57
57
### Designing architecture based on classification labels
58
58
@@ -97,10 +97,10 @@ The MCRA emphasizes that labels should persist with data as it moves across your
97
97
98
98
This control requires organizations to:
99
99
100
-
1.**Establish a data classification scheme** that defines sensitivity levels and handling requirements
101
-
2.**Implement automated discovery** to find sensitive data across cloud and on-premises environments
102
-
3.**Apply sensitivity labels** that persist with data and enable downstream protection
103
-
4.**Maintain data inventories** that track where sensitive data resides
100
+
-**Establish a data classification scheme** that defines sensitivity levels and handling requirements
101
+
-**Implement automated discovery** to find sensitive data across cloud and on-premises environments
102
+
-**Apply sensitivity labels** that persist with data and enable downstream protection
103
+
-**Maintain data inventories** that track where sensitive data resides
104
104
105
105
### DP-2: Monitor anomalies and threats targeting sensitive data
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/4-design-data-security-azure-workloads.md
+37-42Lines changed: 37 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,10 +31,10 @@ Apply Zero Trust principles consistently across all data services:
31
31
32
32
When designing security for any Azure data workload, address these questions:
33
33
34
-
1.**Network access**: Should the service be accessible from the internet, or only through private endpoints?
35
-
2.**Authentication method**: Can you use Microsoft Entra ID, or do legacy requirements mandate other methods?
36
-
3.**Key management**: Are platform-managed keys sufficient, or do regulations require customer-managed keys?
37
-
4.**Threat detection**: What level of monitoring and alerting does the workload require?
34
+
-**Network access**: Should the service be accessible from the internet, or only through private endpoints?
35
+
-**Authentication method**: Can you use Microsoft Entra ID, or do legacy requirements mandate other methods?
36
+
-**Key management**: Are platform-managed keys sufficient, or do regulations require customer-managed keys?
37
+
-**Threat detection**: What level of monitoring and alerting does the workload require?
38
38
39
39
## Design security for Azure SQL Database and Azure SQL Managed Instance
40
40
@@ -54,13 +54,11 @@ Firewalls prevent network access to the server until you explicitly grant access
54
54
55
55
### Authentication for Azure SQL
56
56
57
-
Azure SQL Database and SQL Managed Instance support authentication with Microsoft Entra ID and SQL authentication. SQL Managed Instance additionally supports Windows authentication for Microsoft Entra principals.
57
+
Azure SQL Database and SQL Managed Instance support multiple authentication methods:
58
58
59
-
| Authentication type | Description | Best practice |
|**Microsoft Entra authentication**| Centrally manage identities and permissions of database users along with other Azure services. Supports multifactor authentication, Integrated Windows authentication, and Conditional Access. | Preferred method for all new deployments |
62
-
|**Windows authentication (Kerberos)**| Enables Windows authentication for Azure SQL Managed Instance. Empowers customers to move existing services to the cloud while maintaining a seamless user experience. | Use for hybrid environments with Managed Instance |
63
-
|**SQL authentication**| Authenticate using username and password. | Avoid for new deployments; use only for legacy applications |
59
+
-**Microsoft Entra authentication**: Centrally manage identities and permissions using Microsoft Entra ID. Supports multifactor authentication, Integrated Windows authentication, and Conditional Access. This is the preferred method for all new deployments.
60
+
-**Windows authentication (Kerberos)**: Available for Azure SQL Managed Instance only. Enables Windows authentication for Microsoft Entra principals, allowing customers to move existing services to the cloud while maintaining a seamless user experience.
61
+
-**SQL authentication**: Username and password authentication. Avoid for new deployments; use only for legacy applications that can't support Microsoft Entra authentication.
**Advanced Threat Protection**: Analyzes logs to detect unusual behavior and potentially harmful attempts to access or exploit databases:
98
96
99
-
:::image type="content" source="../media/advanced-threat-detection.png" alt-text="Diagram showing SQL Threat Detection monitoring access to the SQL database for a web app from an external attacker and malicious insider.":::
[Azure Synapse Analytics](/azure/synapse-analytics/guidance/security-white-paper-introduction) is a PaaS analytics service that brings together dedicated SQL pools, serverless SQL pools, Apache Spark pools, and data integration pipelines. Azure Synapse implements a multi-layered security architecture for end-to-end protection.
112
+
[Azure Synapse Analytics](/azure/synapse-analytics/guidance/security-white-paper-introduction) is a PaaS analytics service that brings together dedicated SQL pools, serverless SQL pools, Apache Spark pools, and data integration pipelines. Azure Synapse implements a multi-layered security architecture for end-to-end protection of your data.
117
113
118
114
### Security layers for Synapse
119
115
120
116
Azure Synapse implements five security layers:
121
117
122
-
:::image type="content" source="../media/azure-synapse-security-layers.png" alt-text="Image showing the five layers of Azure Synapse security architecture: Data protection, Access control, Authentication, Network security, and Threat protection.":::
118
+
:::image type="content" source="../media/azure-synapse-security-layers.png" alt-text="Diagram of the five layers of Azure Synapse security architecture: Data protection, Access control, Authentication, Network security, and Threat protection.":::
119
+
120
+
### Data protection
121
+
122
+
Data protection in Synapse covers data classification and encryption:
123
+
124
+
-**At rest (storage)**: Azure Storage encryption with SSE and optional CMK
125
+
-**At rest (database)**: TDE with service-managed or customer-managed keys
126
+
-**In transit**: TLS 1.2 with AES-256 encryption
127
+
-**Double encryption**: Infrastructure encryption at storage layer
123
128
124
-
1.**Data protection**: Identify and classify sensitive data; encrypt data at rest and in motion
125
-
2.**Access control**: Determine a user's right to interact with data using RBAC, row-level security, and column-level security
126
-
3.**Authentication**: Prove the identity of users and applications through Microsoft Entra integration
127
-
4.**Network security**: Isolate network traffic with private endpoints and virtual private networks
128
-
5.**Threat protection**: Identify potential security threats such as unusual access locations, SQL injection attacks, and authentication attacks
129
+
### Access control
129
130
130
-
### Component architecture
131
+
Synapse provides granular access controls to determine a user's right to interact with data:
131
132
132
-
Each individual component of Azure Synapse provides its own security features:
133
+
-**Synapse RBAC roles**: Manage workspace and resource access
134
+
-**SQL permissions**: Control data access in SQL pools using row-level security and column-level security
135
+
-**Azure RBAC**: Manage control plane access
136
+
-**Data exfiltration protection**: Prevent unauthorized data export to external locations
133
137
134
-
:::image type="content" source="../media/azure-synapse-components.png" alt-text="Diagram of Azure Synapse components showing dedicated SQL pools, serverless SQL pools, Apache Spark pools, and pipelines.":::
138
+
### Authentication
135
139
136
-
-**Dedicated SQL pools**: Provisioned clusters with enterprise data warehousing capabilities where compute is isolated from storage
137
-
-**Serverless SQL pools**: On-demand clusters that query data directly over customer-managed Azure Storage accounts
138
-
-**Apache Spark pools**: Spark instances provisioned on-demand based on metadata configurations
139
-
-**Pipelines and Data flows**: Logical grouping of activities for data movement and transformation
140
+
Prove the identity of users and applications through Microsoft Entra integration:
140
141
141
-
### Network security for Synapse
142
+
-**Microsoft Entra authentication**: Centralized identity management with support for multifactor authentication
143
+
-**Managed identities**: Service-to-service authentication without credentials
144
+
-**Service principals**: Application authentication for automated processes
145
+
146
+
### Network security
142
147
143
148
Associate your Synapse workspace with a [managed workspace virtual network](/azure/synapse-analytics/security/synapse-workspace-managed-vnet) to:
144
149
@@ -147,23 +152,13 @@ Associate your Synapse workspace with a [managed workspace virtual network](/azu
147
152
- Ensure network isolation between workspaces for pipelines and Apache Spark workloads
148
153
- Prevent data exfiltration through network controls
149
154
150
-
### Data encryption in Synapse
151
-
152
-
| Data state | Protection mechanism |
153
-
|------------|---------------------|
154
-
|**At rest (storage)**| Azure Storage encryption with SSE and optional CMK |
155
-
|**At rest (database)**| TDE with service-managed or customer-managed keys |
156
-
|**In transit**| TLS 1.2 with AES-256 encryption |
157
-
|**Double encryption**| Infrastructure encryption at storage layer |
158
-
159
-
### Access control for Synapse
155
+
### Threat protection
160
156
161
-
Synapse provides granular access controls:
157
+
Identify potential security threats through monitoring and alerting:
162
158
163
-
-**Synapse RBAC roles**: Manage workspace and resource access
164
-
-**SQL permissions**: Control data access in SQL pools
165
-
-**Azure RBAC**: Manage control plane access
166
-
-**Data exfiltration protection**: Prevent unauthorized data export to external locations
159
+
-**Microsoft Defender for SQL**: Detect unusual access locations, SQL injection attacks, and authentication attacks
160
+
-**Auditing**: Track database activities and maintain compliance with security standards
161
+
-**Vulnerability assessment**: Discover and remediate potential security weaknesses
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/4a-design-security-data-ai-workloads.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,10 +50,10 @@ Apply Zero Trust principles to AI service access:
50
50
51
51
When grounding AI responses with organizational data (retrieval-augmented generation):
52
52
53
-
1.**Data remains in your control**: Azure OpenAI doesn't copy your data; it retrieves from your designated sources
54
-
2.**Access permissions flow through**: Users only receive responses based on data they're authorized to access
55
-
3.**Encryption applies**: Data in Azure AI Search and storage maintains encryption at rest and in transit
56
-
4.**Private connectivity**: Configure private endpoints between Azure OpenAI, AI Search, and storage accounts
53
+
-**Data remains in your control**: Azure OpenAI doesn't copy your data; it retrieves from your designated sources
54
+
-**Access permissions flow through**: Users only receive responses based on data they're authorized to access
55
+
-**Encryption applies**: Data in Azure AI Search and storage maintains encryption at rest and in transit
56
+
-**Private connectivity**: Configure private endpoints between Azure OpenAI, AI Search, and storage accounts
0 commit comments