O'Reilly logo

Microsoft® SQL Server™ 2000 DBA Survival Guide, Second Edition by Mark Spenik, Orryn Sledge

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Beyond Security Basics: Suggested Strategies

In addition to object and statement permissions, you can combine various components within SQL Server to facilitate administration and provide improved security. Following is a list of suggested security strategies:

  • Role-based security management

  • Views for data security

  • Stored procedures for data security

  • Triggers for audit trails

Role-Based Security Management

In the corporate environment, users often work in groups. People in these groups require similar permissions to the database. Whenever multiple users require similar permissions, you should use role-based security. With role-based security, you reduce the number of GRANT, REVOKE, and DENY statements that must be maintained.

Before diving headfirst ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required