Page History
The Access Security Checks audit access and configuration for data access and objects. These security checks take a look at data encryption, remote access, and other object configurations that allow access to the data or object.
The Access Security Checks available on the Configure the Policy section are the following:
Access Security Checks
...
Always Encrypted
...
...
Name
...
C2 Audit Trace Enabled
...
DISA Audit Configuration
...
Implement Change Data Capture
...
Login Audit Level
...
SQL Server Audit is Configured for Logins
...
Configuration Security Checks
...
Name
...
Data Integrity Security Checks
...
Name
...
Login Security Checks
...
Name
...
Permissions Security Checks
...
Name
...
Surface Area Security Checks
...
Name
...