| | | Security Tip of the Month: Blocking Automated SQL Injection Attacks Watch a step-by-step demonstration on how to deploy a new Windows Azure Web Role Application to the Cloud in Azure Platform, create a new Azure Storage Service for the application's data access, create a new Azure Hosted Application Service, configure and publish the Web Role Application's package and configuration, and deploy the application to Azure staging and production environments.
| Data Security in Windows Azure: Part 1 Explore the various methods and tools for securing your application data in Windows Azure including methods for securing Azure Storage accounts and data during the transition to the cloud. This video also covers protocols for securing requests to, and responses from, Azure Storage, platform-provided methods for ensuring data integrity, and cryptographic pubic key distribution between Azure roles and Azure Fabric Controller.
| Data Security in Windows Azure: Part 2 Learn how to make your Azure Storage container and blob items URL-addressable in a secure fashion, including the setup of permission structure on the URLs, generating hashes to secure individual items and containers, expiration and revocation of storage hashes and keys, and auditing access to the store.
| How to Configure SQL Azure Security Familiarize yourself with security within SQL Azure with demonstrations on the creation of logins, databases and users and information about sys.sql_logins and sys.databases, which allow the display of logins and databases from the master database.
| How to Configure the SQL Azure Firewall The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.
| How to Manage SQL Azure Firewall Rules Learn about the IP Firewall Rules inherent in SQL Azure, and get guidance on how to connect to a SQL Azure database using Microsoft SQL Server Management Studio 2008.
| Data Encryption Toolkit for Mobile PCs Get tested guidance and powerful tools to help you protect your organization's most vulnerable data. The strategies outlined in this toolkit are easy to understand, and the guidance shows you how to optimize two key encryption technologies already available to you in Windows XP, Windows Vista, or Windows 7: the Encrypting File System (EFS) and BitLocker Drive Encryption.
| | | | | | | | TechNet Radio: Preserving Data Privacy and Confidentiality in the Cloud Join John Baker and Javier Salido, Senior Program Manager with the Trustworthy Computing Group here at Microsoft, as they discuss some challenges and solutions organizations may face when trying to maintain the privacy and security of their confidential data, if they decide to migrate their infrastructure to the cloud. | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |