Showing posts with the label SecurityShow All

How to Secure Azure Analysis Services and Azure Synapse?

Azure Analysis Services is a fully managed platform as a service (PaaS) that provides enterprise-grade data models in the cloud. Use advanced mashup and modeling features to combine data from multiple data sources, define metrics, and secure your data in a single, tru…

Read more

Lock resources to prevent unexpected changes using Powershell or Azure CLI

You may need to lock a subscription, resource group, or resource to prevent other users in your organization from accidentally deleting or modifying critical resources. You can set the lock level to CanNotDelete or ReadOnly. In the portal, the locks are called Delete …

Read more

How to implement Row-Level Security in Azure SQL Database or SQL Server

Some one of you prefer view-based workarounds for row-level filtering. The benefits of using Row-Level Security (RLS) instead of views include: RLS reduces code complexity by centralizing access logic in a security policy and eliminating the need for an ex…

Read more

Manage Azure RBAC using Power Shell

Azure role-based access control (Azure RBAC) helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to. Before we start first review basics from Microsoft document on RBAC here . Like one of the impo…

Read more

Manage Azure Policy using PowerShell or Azure CLI

Azure Policy helps to enforce organizational standards and to assess compliance at-scale. A policy definition expresses what to evaluate and what action to take. The policy definition itself is represented as a JSON file - you can use one of the pre-defined definitio…

Read more

Apache Sentry Basics and Setup

RPC server stores authorization in relation database. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoo…

Read more

Kerberos and HDFS Encryption

User security contains three parts: Authentication, Authorization and Audit  Authentication simply means verifying who the user claims to be. There are three factors of authentication: Who you are, What you know and What you have  You may have heard the term two-facto…

Read more