├── CODE_OF_CONDUCT.md
├── LICENSE
├── README.md
├── SECURITY.md
├── SUPPORT.md
├── assets
├── IMG001_DatabaseSecurity_NIST_CSF.svg
├── IMG002_SharedResponsibility.svg
├── IMG003_DefenseInDepthForDataSecurity.svg
├── IMG006_DatabaseSecuritOverview.svg
├── IMG007_AzurePrivateLink.svg
├── IMG009_CheckIcon.png
├── IMG010_DefenderForCloudDataCollectionPresentation.png
├── IMG011_DefenderSetting1.png
├── IMG013_DefenderSetting3.png
├── IMG014_DefenderSQLSetting1.png
├── IMG015_DefenderSQLSetting2.png
├── IMG016_DefenderSQLSetting3.png
├── IMG017_Attension.png
├── IMG017_Notice.png
├── IMG017_Warning.png
├── IMG018_SecurityAlert1.png
├── IMG019_SecurityAlert2.png
├── IMG020_VulnerabilityCheck1.png
├── IMG021_VulnerabilityCheck2.png
├── IMG022_VulnerabilityCheck3.png
├── IMG023_VulnerabilityCheck4.png
├── IMG024_VulnerabilityCheck5.png
├── IMG025_AlrertMail1.png
└── IMG026_AlrertMail2.png
├── chapter01.md
├── chapter02.md
├── chapter03.md
└── chapterfin.md
/CODE_OF_CONDUCT.md:
--------------------------------------------------------------------------------
1 | # Microsoft Open Source Code of Conduct
2 |
3 | This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
4 |
5 | Resources:
6 |
7 | - [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/)
8 | - [Microsoft Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/)
9 | - Contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with questions or concerns
10 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) Microsoft Corporation.
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Azure SQL: セキュリティの脅威への対策ガイド
2 |
3 |
4 | 本ドキュメントでは、データ基盤、データベースで求められるセキュリティについて解説し、Microsoft Defender for SQL を使った効果的なセキュリティ対策について紹介しています。
5 | ここで取り上げた製品・サービスの詳細および最新情報は、[製品ドキュメント](https://docs.microsoft.com/ja-jp/azure/azure-sql/database/azure-defender-for-sql)をご参照ください。
6 | なお、本ドキュメントの作成には、[株式会社アクアシステムズ様](https://www.aqua-systems.co.jp/)にご協力をいただきました。
7 |
8 |
9 |
10 | ### [第1章 データ基盤におけるデータセキュリティの重要性](/chapter01.md)
11 |
12 |
13 | 大量のデータの利活用を前提にした DX の推進が求められる時代。データ利活用にはセキュリティを担保することも要求されます。データ セキュリティの全体像を紹介します。
14 |
15 |
16 | ### [第2章 データ基盤でのセキュリティ要件](/chapter02.md)
17 |
18 |
19 | 重要データを守るために、データ基盤、データベースにおけるセキュリティ要件についてまとめます。
20 | 認証及びアクセス制御、通信やデータの暗号化といった防御対策に加えて、防御をすり抜ける、あるいは、正当なアクセス権による正常とみなされる操作の中にあるリスクに対しての検知対策の重要性について解説します。
21 |
22 |
23 | ### [第3章 Microsoft Defender for SQL で実現するデータベースセキュリティ](/chapter03.md)
24 |
25 |
26 | セキュリティの中でもデータ基盤レイヤでの対策を理解した要員、体制を維持することは、時間もコストもかかり、ハードルが高いのが現実です。
27 | Microsoft Defender for SQL によって効果的なデータ基盤のセキュリティを効率的に実現していく方法を紹介します。
28 |
29 |
30 | ### [まとめ](/chapterfin.md)
31 |
32 |
33 |
34 |
35 |
36 | ## Contributing
37 |
38 | This project welcomes contributions and suggestions. Most contributions require you to agree to a
39 | Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us
40 | the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
41 |
42 | When you submit a pull request, a CLA bot will automatically determine whether you need to provide
43 | a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions
44 | provided by the bot. You will only need to do this once across all repos using our CLA.
45 |
46 | This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
47 | For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or
48 | contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.
49 |
50 | ## Trademarks
51 |
52 | This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft
53 | trademarks or logos is subject to and must follow
54 | [Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/usage/general).
55 | Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship.
56 | Any use of third-party trademarks or logos are subject to those third-party's policies.
57 |
--------------------------------------------------------------------------------
/SECURITY.md:
--------------------------------------------------------------------------------
1 |
2 |
3 | ## Security
4 |
5 | Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin), and [our GitHub organizations](https://opensource.microsoft.com/).
6 |
7 | If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://docs.microsoft.com/en-us/previous-versions/tn-archive/cc751383(v=technet.10)), please report it to us as described below.
8 |
9 | ## Reporting Security Issues
10 |
11 | **Please do not report security vulnerabilities through public GitHub issues.**
12 |
13 | Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://msrc.microsoft.com/create-report).
14 |
15 | If you prefer to submit without logging in, send email to [secure@microsoft.com](mailto:secure@microsoft.com). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://www.microsoft.com/en-us/msrc/pgp-key-msrc).
16 |
17 | You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
18 |
19 | Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
20 |
21 | * Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
22 | * Full paths of source file(s) related to the manifestation of the issue
23 | * The location of the affected source code (tag/branch/commit or direct URL)
24 | * Any special configuration required to reproduce the issue
25 | * Step-by-step instructions to reproduce the issue
26 | * Proof-of-concept or exploit code (if possible)
27 | * Impact of the issue, including how an attacker might exploit the issue
28 |
29 | This information will help us triage your report more quickly.
30 |
31 | If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://microsoft.com/msrc/bounty) page for more details about our active programs.
32 |
33 | ## Preferred Languages
34 |
35 | We prefer all communications to be in English.
36 |
37 | ## Policy
38 |
39 | Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://www.microsoft.com/en-us/msrc/cvd).
40 |
41 |
--------------------------------------------------------------------------------
/SUPPORT.md:
--------------------------------------------------------------------------------
1 | # TODO: The maintainer of this repo has not yet edited this file
2 |
3 | **REPO OWNER**: Do you want Customer Service & Support (CSS) support for this product/project?
4 |
5 | - **No CSS support:** Fill out this template with information about how to file issues and get help.
6 | - **Yes CSS support:** Fill out an intake form at [aka.ms/onboardsupport](https://aka.ms/onboardsupport). CSS will work with/help you to determine next steps.
7 | - **Not sure?** Fill out an intake as though the answer were "Yes". CSS will help you decide.
8 |
9 | *Then remove this first heading from this SUPPORT.MD file before publishing your repo.*
10 |
11 | # Support
12 |
13 | ## How to file issues and get help
14 |
15 | This project uses GitHub Issues to track bugs and feature requests. Please search the existing
16 | issues before filing new issues to avoid duplicates. For new issues, file your bug or
17 | feature request as a new Issue.
18 |
19 | For help and questions about using this project, please **REPO MAINTAINER: INSERT INSTRUCTIONS HERE
20 | FOR HOW TO ENGAGE REPO OWNERS OR COMMUNITY FOR HELP. COULD BE A STACK OVERFLOW TAG OR OTHER
21 | CHANNEL. WHERE WILL YOU HELP PEOPLE?**.
22 |
23 | ## Microsoft Support Policy
24 |
25 | Support for this **PROJECT or PRODUCT** is limited to the resources listed above.
26 |
--------------------------------------------------------------------------------
/assets/IMG001_DatabaseSecurity_NIST_CSF.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/assets/IMG003_DefenseInDepthForDataSecurity.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/assets/IMG006_DatabaseSecuritOverview.svg:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/assets/IMG009_CheckIcon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG009_CheckIcon.png
--------------------------------------------------------------------------------
/assets/IMG010_DefenderForCloudDataCollectionPresentation.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG010_DefenderForCloudDataCollectionPresentation.png
--------------------------------------------------------------------------------
/assets/IMG011_DefenderSetting1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG011_DefenderSetting1.png
--------------------------------------------------------------------------------
/assets/IMG013_DefenderSetting3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG013_DefenderSetting3.png
--------------------------------------------------------------------------------
/assets/IMG014_DefenderSQLSetting1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG014_DefenderSQLSetting1.png
--------------------------------------------------------------------------------
/assets/IMG015_DefenderSQLSetting2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG015_DefenderSQLSetting2.png
--------------------------------------------------------------------------------
/assets/IMG016_DefenderSQLSetting3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG016_DefenderSQLSetting3.png
--------------------------------------------------------------------------------
/assets/IMG017_Attension.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG017_Attension.png
--------------------------------------------------------------------------------
/assets/IMG017_Notice.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG017_Notice.png
--------------------------------------------------------------------------------
/assets/IMG017_Warning.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG017_Warning.png
--------------------------------------------------------------------------------
/assets/IMG018_SecurityAlert1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG018_SecurityAlert1.png
--------------------------------------------------------------------------------
/assets/IMG019_SecurityAlert2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG019_SecurityAlert2.png
--------------------------------------------------------------------------------
/assets/IMG020_VulnerabilityCheck1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG020_VulnerabilityCheck1.png
--------------------------------------------------------------------------------
/assets/IMG021_VulnerabilityCheck2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG021_VulnerabilityCheck2.png
--------------------------------------------------------------------------------
/assets/IMG022_VulnerabilityCheck3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG022_VulnerabilityCheck3.png
--------------------------------------------------------------------------------
/assets/IMG023_VulnerabilityCheck4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG023_VulnerabilityCheck4.png
--------------------------------------------------------------------------------
/assets/IMG024_VulnerabilityCheck5.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG024_VulnerabilityCheck5.png
--------------------------------------------------------------------------------
/assets/IMG025_AlrertMail1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG025_AlrertMail1.png
--------------------------------------------------------------------------------
/assets/IMG026_AlrertMail2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure/jp-sqlsecurity/0d9d0e897b6c2c802cd59e0ec585ea22cbbf1e80/assets/IMG026_AlrertMail2.png
--------------------------------------------------------------------------------
/chapter01.md:
--------------------------------------------------------------------------------
1 | # 第1章 データ基盤におけるデータ セキュリティの重要性
2 |
3 | 大量のデータの利活用を前提にした DX の推進が求められる時代。データ利活用にはセキュリティを担保することも要求され、多層防御の中で、データの格納先であり、データの源泉であるデータ基盤でのセキュリティの重要性が高まっています。
4 | まずは、データ セキュリティの全体像を紹介します。
5 |
6 | ## 1. NIST CSF(Cyber Security Framework)コア機能と Azure での対応
7 | 企業・組織が サイバーセキュリティ対策を向上させるための指針として、ISMS、CIS Controls、PCI DSS、NIST CSF などが活用されます。
8 | データ基盤である SQL Database、Azure Synapse Analytics でもこれらのフレームワークを元にセキュリティ対策を実施することが求められます。
9 |
10 | 「重要インフラのサイバーセキュリティ対策を改善するためのフレームワーク」である [NIST CSF(Cyber Security Framework)は、IPA より翻訳版](https://www.ipa.go.jp/files/000071204.pdf)が公開されており、世界で多くの企業・組織で活用されています。
11 | その 5 つのコア機能に対して、データ基盤 SQL Database, Azure Synapse Analytics での主な対策と利用できるサービスは以下のようになります。
12 |
13 |
14 |
15 |
機能
16 |
内容
17 |
Azure データ基盤での対応
18 |
活用が可能なサービス
19 |
20 |
21 |
識別・評価 Identify
22 |
脅威検出/データ資産評価
23 |
データ識別・分類、脆弱性評価
24 |
Microsoft Purview Data Catalog(データ識別・分類) Microsoft Sentinel(定期分析) Microsoft Defender for SQL