Summary
In this chapter, we covered how to implement a comprehensive security strategy for Azure SQL. We discussed, and you implemented, protection against unauthorized network connections, unauthorized user access, data leakage and theft, and database vulnerabilities.
The information and hands-on exercises that we covered in this chapter have equipped you with the knowledge and skills to implement a multi-layered security strategy to protect databases in Azure against common risks. In the next chapter, we will cover Azure subscription governance.