Planning Security

The purpose of a security plan is to identify which users can see what data and perform what activities in the database. The scenarios covered in this topic follow these steps in presenting security requirements:

  1. List all the items and activities in the database that must be controlled through security.
  2. Identify the individuals and groups in the company.
  3. Cross-reference the two lists to identify which users can see what data and perform what activities in the database.
Security Examples

The following security examples are presented to display three common security designs ranging from the simplest single user database to a large corporate security system. Each example contains an explanation of the planning and implementation steps to create a Microsoft® SQL Server™ security system for the specific example.

  


(c) 1988-98 Microsoft Corporation. All Rights Reserved.