Implementing defense in depth for Azure SQL
There are multiple attack vectors that an adversary could exploit to compromise our Azure SQL database instances. For this reason, our security strategy should follow a defense-in-depth approach that includes the following layers of protection:
- Protection against unauthorized network access
- Protection against unauthorized user access
- Protection against vulnerabilities and threats
- Protection against data leakage and theft
Figure 11.3 shows this defense:
In the following sections in this chapter, we will cover these different layers of protection in detail starting with the mitigation of unauthorized network access.