Chapter 12

Auditing for Security

Abstract

In this chapter we look into using auditing to ensure that security best practices are being followed so that the database instance is secure.

Keywords

auditing
C2
policy-based management
PBM
xEvents

Information in this chapter

Login auditing
Data modification auditing
Data querying auditing
Schema change auditing
Using policy-based management to ensure policy compliance
C2 auditing
Common criteria compliance
 
Setting security policies is a great start, but you need to ensure that the system remains secure. This is where auditing comes into play. Auditing by itself is not good enough; someone needs to review the auditing information that has been collected in order to ensure that ...

Get Securing SQL Server, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.