From the course: Complete Guide to Advanced SQL Server

Protect your data with SQL Server Ledger - SQL Server Tutorial

From the course: Complete Guide to Advanced SQL Server

Protect your data with SQL Server Ledger

In section three, we're going to turn our attention to a new feature of SQL Server called ledger, and see how it can protect data from unauthorized modifications, either by outside attackers or through deliberate manipulations of high-privileged users. Threats to the security and validity of your data come in all shapes and sizes. It seems like we hear about large data breaches all the time, but what about smaller attacks on your data that quietly and strategically tamper with values? These kinds of tampering attacks can be just as damaging and can be much harder to detect. Ledger uses blockchain technologies to record an immutable log of authorized transactions in your database. With a trusted ledger digest in hand, audits can detect unauthorized tampering early so that you can take immediate action. In a ledger protected database, a chain of custody and authentication can be built around the data that's useful for proving to outside authorities, regulators, and institutions that your data has not been maliciously altered. So let's see what this feature is all about, and you can make an informed decision on whether it's a good fit for incorporating into your database projects.

Contents