New Blog Post | Azure Defender PoC Series – Azure Defender for SQL

%3CLINGO-SUB%20id%3D%22lingo-sub-2666718%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Azure%20Defender%20PoC%20Series%20%E2%80%93%20Azure%20Defender%20for%20SQL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2666718%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AshleyMartin_0-1629400071644.png%22%20style%3D%22width%3A%20699px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F304516i9ECF0D26CC1EAB46%2Fimage-dimensions%2F699x243%3Fv%3Dv2%22%20width%3D%22699%22%20height%3D%22243%22%20role%3D%22button%22%20title%3D%22AshleyMartin_0-1629400071644.png%22%20alt%3D%22AshleyMartin_0-1629400071644.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fazure-defender-poc-series-azure-defender-for-sql%2Fba-p%2F2657459%22%20target%3D%22_blank%22%3EAzure%20Defender%20PoC%20Series%20%E2%80%93%20Azure%20Defender%20for%20SQL%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThis%20article%20is%20a%20continuation%20of%20Azure%20Defender%20PoC%20Series%20which%20provides%20you%20guidelines%20on%20how%20to%20perform%20a%20proof%20of%20concept%20for%20a%20specific%20Azure%20Defender%20plan.%20For%20a%20more%20holistic%20approach%20where%20you%20need%20to%20validate%20Azure%20Security%20Center%20and%20Azure%20Defender%2C%20please%20read%E2%80%AF%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-security-center%2Fhow-to-effectively-perform-an-azure-security-center-poc%2Fba-p%2F516874%22%20target%3D%22_blank%22%3EHow%20to%20Effectively%20Perform%20an%20Azure%20Security%20Center%20PoC%3C%2FA%3E%3CSPAN%3E%E2%80%AFarticle%3C%2FSPAN%3E.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere%20can%20be%20many%20security%20vulnerabilities%20in%20databases%20that%20are%20sometimes%20taken%20advantage%20of%20by%20malicious%20actors.%20According%20to%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Foctoverse.github.com%2Fstatic%2Fgithub-octoverse-2020-security-report.pdf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGithub%202020%20report%3C%2FA%3E%2C%20a%20vulnerability%20typically%20goes%20undetected%20for%20218%20weeks%20(just%20over%20four%20years)%20before%20being%20disclosed%20and%20fixed.%20Injection%20attacks%2C%20such%20as%20those%20on%20SQL%20and%20NoSQL%2C%20are%20among%20the%20most%20popular%20types%20of%20cyberattacks%20for%20web%20applications%20(as%20per%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fowasp.org%2Fwww-project-top-ten%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EOWASP%20Top%2010%3C%2FA%3E).%3C%2FP%3E%0A%3CP%3ESQL%20Injection%20attacks%2C%20brute-force%20attacks%2C%20SQL%20shell%20OS%20attacks%20leading%20to%20crypto-mining%20and%20ransomware%2C%20can%20be%20detected%20and%20remediated%20by%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EAzure%20Defender%20for%20SQL%20plan%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3EOriginal%20Post%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fnew-blog-post-azure-defender-poc-series-azure-defender-for-sql%2Fm-p%2F2666699%22%20target%3D%22_blank%22%3ENew%20Blog%20Post%20%7C%20Azure%20Defender%20PoC%20Series%20%E2%80%93%20Azure%20Defender%20for%20SQL%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

AshleyMartin_0-1629400071644.png

Azure Defender PoC Series – Azure Defender for SQL - Microsoft Tech Community

This article is a continuation of Azure Defender PoC Series which provides you guidelines on how to perform a proof of concept for a specific Azure Defender plan. For a more holistic approach where you need to validate Azure Security Center and Azure Defender, please read How to Effectively Perform an Azure Security Center PoC article

 

There can be many security vulnerabilities in databases that are sometimes taken advantage of by malicious actors. According to the Github 2020 report, a vulnerability typically goes undetected for 218 weeks (just over four years) before being disclosed and fixed. Injection attacks, such as those on SQL and NoSQL, are among the most popular types of cyberattacks for web applications (as per OWASP Top 10).

SQL Injection attacks, brute-force attacks, SQL shell OS attacks leading to crypto-mining and ransomware, can be detected and remediated by the Azure Defender for SQL plan.

Original Post: New Blog Post | Azure Defender PoC Series – Azure Defender for SQL - Microsoft Tech Community

0 Replies