9.10. Summary

In this chapter, you learned how to secure your data and your Database Engine. We covered many ways to secure your data, whether through granular security or roles. Another mechanism assumes the attacker can get the sensitive data, but prevents the attacker from reading it due to encryption. Now that you know how to protect your SQL Server data, the next chapter explains how to enforce SQL Server configuration using Policy-Based Management.

Get Professional Microsoft® SQL Server® 2008 Administration now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.