Pro SQL Server 2012 Reporting Services

(sharon) #1
CHAPTER 11  SECURING REPORTS

Summary

In this chapter, you examined three of the security tasks essential to secure SSRS deployment:
encrypting, authenticating, and auditing. Internally, only employees who need access to confidential
data should have it, and you can ensure this by applying a special filter for a report deployment. As a
company that works heavily with confidential patient information, we are required to conform to the
regulations imposed by HIPAA. However, in other industries, many similar regulations exist. Having
security policies and procedures in place for any company is good practice, even when not working
under stringent regulations. Fortunately, SSRS is designed to use the core-level security mechanisms
that already exist in your organization through Windows authentication and can be extended, when
required, to support other means of custom authentication.

Free download pdf