Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
To help improve security, Azure SQL Database and Azure SQL Managed Instance include built-in security controls that you can use to limit and control access, protect data, and monitor threats.
Security controls include:
- Firewall rules limiting connectivity by IP address and virtual network
- Microsoft Entra authentication for centralized identity management
- Secure connectivity using TLS encryption
- Access management and authorization
- Data encryption at rest and in transit
- Database auditing and threat detection
- Advanced data security features
Introduction
Cloud computing requires new security paradigms that may be unfamiliar to many application users, database administrators, and programmers. Organizations can leverage Azure SQL's comprehensive security features to protect sensitive data and meet regulatory compliance requirements.
Checklist
We recommend that you read the Azure SQL Database security best practices article before reviewing this checklist. Understanding the best practices will help you get the most value from this checklist. Use this checklist to verify that you've addressed the important security controls in Azure database security.
| Checklist Category | Description |
|---|---|
| Protect Data | |
Encryption in transit |
|
Encryption at rest |
|
Encryption in use |
|
| Control Access | |
Database access |
|
Network access control |
|
Application access control |
|
| Proactive Monitoring | |
Auditing and detection |
|
Vulnerability assessment |
|
Centralized security management |
|
| Data Integrity | |
Ledger capability |
|
Conclusion
Azure SQL Database and Azure SQL Managed Instance provide robust database platforms with comprehensive security features meeting organizational and regulatory compliance requirements. You can protect data throughout its lifecycle—at rest, in transit, and in use—using Transparent Data Encryption, Always Encrypted, and TLS. Fine-grained access controls including Row-Level Security, Dynamic Data Masking, and Microsoft Entra authentication ensure only authorized users access sensitive data. Continuous monitoring through auditing, Microsoft Defender for SQL, and Vulnerability Assessment helps identify and remediate security threats proactively.
Next steps
You can improve the protection of your database against malicious users or unauthorized access with a few simple steps:
- Configure firewall rules for your server and databases
- Protect your data with encryption
- Enable SQL Database auditing
- Enable Microsoft Defender for SQL for threat detection
- Review security best practices