Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Using SQL Census to Audit SQL Server Permissions

DZone's Guide to

Using SQL Census to Audit SQL Server Permissions

SQL Census is a desktop app that inspects your SQL Server and Active Directory to produce a clear overview of each user’s permissions. Read on to learn how it works.

· Database Zone ·
Free Resource

Compliant Database DevOps and the role of DevSecOps DevOps is becoming the new normal in application development, and DevSecOps is now entering the picture. By balancing the desire to release code faster with the need for the same code to be secure, it addresses increasing demands for data privacy. But what about the database? How can databases be included in both DevOps and DevSecOps? What additional measures should be considered to achieve truly compliant database DevOps? This whitepaper provides a valuable insight. Get the whitepaper

We’ve just released SQL Census, a prototype tool from Redgate’s Foundry division that makes auditing SQL Server user access permissions much easier. You can try it for free by downloading it from the Foundry website.

To use SQL Census, you’ll need a free Microsoft Azure account — the tool doesn’t consume any Azure resources, it’s just a handy way for us to work more closely with our early users.

How Does It Work?

SQL Census is a desktop application that inspects your SQL Server and Active Directory and produces a clear overview of each user’s permissions, including what objects are affected and how.

If you’ve ever spent time looking into how SQL Server permissions hierarchies work, I’m sure you’ve come across this "helpful" diagram listing the relationships between the 237 different permissions and 18 fixed roles in SQL Server:

SQL Server 2017 database engine permissions

SQL Census takes the pain out of interpreting SQL Server’s complex permissions hierarchy, allowing you (and your auditors) to gain a clear understanding of your users’ effective permissions.

Choosing the Database You Want to Inspect

After logging into SQL Census, the tool looks for servers on your network and pre-populates a list for you to choose from. Don’t worry if your server isn’t listed; just type it into the box. You’ll then be given a list of databases on that server to choose from. When you’re ready, hit the Inspect user access button:

SQL Census will then inspect your selected database. SQL Census knows all the ways that a server login can have permissions allocated — whether through server/database roles, object permissions, ownership, and even less well-known routes such as CONTROL permissions. Once complete, you’ll see an overview of your users with access to this database.

Capabilities Overview

SQL Census understands how SQL Server’s 237 different permissions, nine fixed server roles, and nine fixed database roles hang together and condenses these into seven capabilities:

  1. Server administrator.
  2. Database administrator.
  3. Database owner.
  4. Schema admin.
  5. Data writer.
  6. Data reader.
  7. Connect/public.

User Overview

SQL Census surfaces all the associated Active Directory Users associated with a Windows Group SQL Login, allowing you to get more fine-grained information without using multiple tools. You can now dig into individual users to see all permissions they have against all objects in the database:

Permissions Map

What permissions a user has is only part of the picture; you also need to know how they inherit these permissions. On top of this, you will at some point need to explain how these permissions are inherited to your security team or auditor who might not be a SQL Server expert. SQL Census simplifies this by visualizing these relationships in a simple Permissions Map:

What Next?

Thanks to our Early Access users, SQL Census is evolving rapidly and we’re working hard to make it more flexible and robust. You can help us shape SQL Census by giving us feedback (the more brutally honest, the better) via the in-tool support widget (the red bubble in the bottom right), or by emailing us.

The next major feature on our roadmap is generating a user access permissions report. There are many different forms these reports can take and we’d love to get your input into what report features are the most valuable to you.

Compliant Database DevOps and the role of DevSecOps DevOps is becoming the new normal in application development, and DevSecOps is now entering the picture. By balancing the desire to release code faster with the need for the same code to be secure, it addresses increasing demands for data privacy. But what about the database? How can databases be included in both DevOps and DevSecOps? What additional measures should be considered to achieve truly compliant database DevOps? This whitepaper provides a valuable insight. Get the whitepaper

Topics:
database ,tutorial ,sql census ,sql server ,permissions

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}