O'Reilly logo

Smart Business Intelligence Solutions with Microsoft® SQL Server® 2008 by Kevin S. Goff Lynn Langit Davide Mauri, Sahil Malik, and John C. Welch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Security Requirements

As with scalability, we’ll get to a more comprehensive discussion of security later in this book. We include an introduction to this topic here because we’ve noted that some customers elect to use a copy (or a subset) of production data in development environments. If this is your situation, it’s particularly critical that you establish appropriate security for this data from the start. Even if you use masked or fake data, implementing a development environment with least-privilege security facilitates an appropriate transition to a secure production environment.

Note

Note

You can use a free tool to help you plan security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required