Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Azure Data and AI Architect Handbook

You're reading from  Azure Data and AI Architect Handbook

Product type Book
Published in Jul 2023
Publisher Packt
ISBN-13 9781803234861
Pages 284 pages
Edition 1st Edition
Languages
Authors (2):
Olivier Mertens Olivier Mertens
Profile icon Olivier Mertens
Breght Van Baelen Breght Van Baelen
Profile icon Breght Van Baelen
View More author details

Table of Contents (18) Chapters

Preface Part 1: Introduction to Azure Data Architect
Chapter 1: Introduction to Data Architectures Chapter 2: Preparing for Cloud Adoption Part 2: Data Engineering on Azure
Chapter 3: Ingesting Data into the Cloud Chapter 4: Transforming Data on Azure Chapter 5: Storing Data for Consumption Part 3: Data Warehousing and Analytics
Chapter 6: Data Warehousing Chapter 7: The Semantic Layer Chapter 8: Visualizing Data Using Power BI Chapter 9: Advanced Analytics Using AI Part 4: Data Security, Governance, and Compliance
Chapter 10: Enterprise-Level Data Governance and Compliance Chapter 11: Introduction to Data Security Index Other Books You May Enjoy

Summary

In this chapter on data security, we discussed five layers of data security that are crucial for protecting sensitive data. These layers are data protection, access control, authentication, network security, and threat protection.

We covered data protection, which involved implementing data encryption at rest and data encryption in transit. We also discussed access control, which involved controlling who had permission to access data. We explained various access control mechanisms, such as RBAC, SASs, RLS, CLS, OLS, and dynamic data masking. These mechanisms ensure that only authorized users can access specific data based on their roles or permissions.

Authentication is another important layer of data security that we covered. We emphasized the use of strong passwords, MFA, and firewall rules to prevent unauthorized access. Strong passwords and MFA help enhance security by requiring users to provide additional proof of their identity beyond just a password. Firewall rules...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}