Skip to content

Commit 1043441

Browse files
Merge pull request #36006 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-04 23:30 UTC
2 parents f5f6da4 + 79c9d3e commit 1043441

File tree

8 files changed

+56
-9
lines changed

8 files changed

+56
-9
lines changed

azure-sql/includes/virtual-machines-best-practices-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,4 +31,4 @@ SQL Server features and capabilities provide methods of securing data at the dat
3131
- Use [Azure Policy](/azure/governance/policy/overview) to create business rules that can be applied to your environment. Azure Policies evaluate Azure resources by comparing the properties of those resources against rules defined in JSON format.
3232
- Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements. Azure Blueprints are [different than Azure Policies](/azure/governance/blueprints/overview#how-its-different-from-azure-policy).
3333
- Use Windows Server 2019 or Windows Server 2022 to be [FIPS](../virtual-machines/windows/security-considerations-best-practices.md#fips-compliance) compliant with SQL Server on Azure VMs.
34-
34+
- Treat restoring backups as a high-risk operation and [never restore a backup from an untrusted source](../virtual-machines/windows/security-considerations-best-practices.md#security-risk-of-restoring-backups-from-untrusted-sources).

azure-sql/managed-instance/recovery-using-backups.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about point-in-time restore, which enables you to roll back a
55
author: dinethi
66
ms.author: dinethi
77
ms.reviewer: wiassaf, mathoma, strrodic, mlandzic
8-
ms.date: 07/10/2025
8+
ms.date: 12/05/2025
99
ms.service: azure-sql-managed-instance
1010
ms.subservice: backup-restore
1111
ms.topic: how-to
@@ -211,6 +211,10 @@ It's essential to acknowledge that geo-restore serves as an appropriate disaster
211211

212212
For more information about business continuity choices, see [Overview of business continuity](../database/business-continuity-high-availability-disaster-recover-hadr-overview.md).
213213

214+
## Security risk of restoring backups from untrusted sources
215+
216+
[!INCLUDE [backup-restore-security-risk](../../docs/includes/backup-restore-security-risk.md)]
217+
214218
## Limitations
215219

216220
Consider the following limitations when working with backups and Azure SQL Managed Instance:

azure-sql/virtual-machines/windows/backup-restore.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Describes backup and restore considerations for SQL Server database
44
author: AbdullahMSFT
55
ms.author: amamun
66
ms.reviewer: mathoma, randolphwest
7-
ms.date: 09/17/2025
7+
ms.date: 12/05/2025
88
ms.service: azure-vm-sql-server
99
ms.subservice: backup
10-
ms.topic: conceptual
10+
ms.topic: article
1111
tags: azure-resource-management
1212
---
1313
# Backup and restore for SQL Server on Azure VMs
@@ -137,6 +137,10 @@ The following table summarizes the capabilities of each backup and restore optio
137137
| Monitor backup jobs with SSMS or Transact-SQL scripts | Yes | Yes | Yes |
138138
| Restore databases with SSMS or Transact-SQL scripts | Yes | No | Yes |
139139

140+
## Security risk of restoring backups from untrusted sources
141+
142+
[!INCLUDE [backup-restore-security-risk](../../../docs/includes/backup-restore-security-risk.md)]
143+
140144
## Related content
141145

142146
If you're planning your deployment of SQL Server on Azure VM, you can find provisioning guidance in the following guide: [How to provision a Windows SQL Server virtual machine in the Azure portal](create-sql-vm-portal.md).

azure-sql/virtual-machines/windows/security-considerations-best-practices.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides general guidance for securing SQL Server runn
44
author: dplessMSFT
55
ms.author: dpless
66
ms.reviewer: mathoma, randolphwest
7-
ms.date: 09/16/2025
7+
ms.date: 12/05/2025
88
ms.service: azure-vm-sql-server
99
ms.subservice: security
1010
ms.topic: best-practice
@@ -205,6 +205,10 @@ To be FIPS compliant with SQL Server on Azure VMs, you should be on Windows Serv
205205

206206
SQL Server isn't currently FIPS compliant on Linux Azure VMs.
207207

208+
## Security risk of restoring backups from untrusted sources
209+
210+
[!INCLUDE [backup-restore-security-risk](../../../docs/includes/backup-restore-security-risk.md)]
211+
208212
## Related content
209213

210214
Review the security best practices for [SQL Server](/sql/relational-databases/security/) and [Azure VMs](/azure/virtual-machines/security-recommendations), and then review this article for the best practices that apply to SQL Server on Azure VMs specifically.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
author: MashaMSFT
3+
ms.author: mathoma
4+
ms.date: 12/05/2025
5+
ms.service: sql
6+
ms.topic: include
7+
---
8+
This section outlines the security risk associated with restoring backups from untrusted sources to any SQL Server environment, including on-premises, Azure SQL Managed Instance, SQL Server on Azure Virtual Machines (VMs) and any other environment.
9+
10+
### Why this matters
11+
12+
Restoring SQL backup files (`.bak`) introduces a potential risk if the backup originates from an untrusted source. The security risk is exacerbated further when a SQL Server environment has multiple instances, as it amplifies the area of threat. While backups that remain within a trusted boundary pose no security issue, restoring a malicious backup can compromise the security of the entire environment.
13+
14+
A malicious `.bak` file can:
15+
- Take over the entire SQL Server instance.
16+
- Escalate privileges and gain unauthorized access to the underlying host or virtual machine.
17+
18+
This attack occurs before any validating scripts or security checks can execute, which makes it extremely dangerous. Restoring an untrusted backup is equivalent to running untrusted applications on a critical server or virtual machine, and introducing arbitrary code execution into your environment.
19+
20+
### Best practices
21+
22+
Follow these backup security best practices to reduce the threat to your SQL Server environments:
23+
- Treat restoring backups as a high-risk operation.
24+
- Reduce the threat service area by using isolated instances.
25+
- Only allow trusted backups: never restore backups from unknown or external sources.
26+
- Only allow backups that have remained within a trusted boundary: ensure backups originate from within the trusted boundary.
27+
- Do not bypass security controls for convenience.
28+
- Enable [server-level auditing](/sql/t-sql/statements/create-server-audit-specification-transact-sql) to capture backup and restore events and mitigate audit evasion.

docs/linux/includes/editions-sql-server-2025-later-versions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.custom:
1111
| --- | --- |
1212
| `Evaluation` | SQL Server Evaluation edition |
1313
| `Express` | SQL Server Express edition |
14-
| `StandardDeveloper` | SQL Server Developer edition |
14+
| `StandardDeveloper`<br /><br />(For containers, use `DeveloperStandard`) | SQL Server Standard Developer edition |
1515
| `Standard` | SQL Server Standard edition |
16-
| `EnterpriseDeveloper` | SQL Server Developer edition |
16+
| `EnterpriseDeveloper`<br /><br />(For containers, use `Developer`) | SQL Server Enterprise Developer edition |
1717
| `Enterprise` | This legacy option represents Enterprise edition Server + Client Access License (CAL) based licensing, and is limited to a maximum of 20 cores per SQL Server instance. `Enterprise` isn't available for new agreements. You should choose `EnterpriseCore` when you wish to deploy Enterprise edition. |
1818
| `EnterpriseCore` | SQL Server Enterprise Core edition. `EnterpriseCore` represents the core-based server licensing model with no core limits. For more information, see [Compute capacity limits by edition of SQL Server](../../sql-server/compute-capacity-limits-by-edition-of-sql-server.md). |
1919
| `A product key` | If you specify a product key, it must be in the form of `#####-#####-#####-#####-#####`, where `#` is a number or a letter. |

docs/relational-databases/backup-restore/back-up-and-restore-of-sql-server-databases.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: "Back up and Restore of SQL Server Databases"
33
description: This article describes the benefits of backing up SQL Server databases and introduces backup and restore strategies and security considerations.
44
author: MashaMSFT
55
ms.author: mathoma
6-
ms.date: 08/25/2025
6+
ms.date: 12/05/2025
77
ms.service: sql
88
ms.subservice: backup-restore
9-
ms.topic: conceptual
9+
ms.topic: article
1010
ms.update-cycle: 1825-days
1111
helpviewer_keywords:
1212
- "disaster recovery [SQL Server], see restoring [SQL Server]"
@@ -173,6 +173,10 @@ Use advanced features like `BACKUP CHECKSUM` to detect problems with the backup
173173
We recommend that you document your backup and restore procedures and keep a copy of the documentation in your run book.
174174
We also recommend that you maintain an operations manual for each database. This operations manual should document the location of the backups, backup device names (if any), and the amount of time that is required to restore the test backups.
175175

176+
## Security risk of restoring backups from untrusted sources
177+
178+
[!INCLUDE [backup-restore-security-risk](../../includes/backup-restore-security-risk.md)]
179+
176180
## Monitor progress with XEvent
177181

178182
Backup and restore operations can take a considerable amount of time due to the size of a database and the complexity of the operations involved. When issues arise with either operation, you can use the `backup_restore_progress_trace` extended event to monitor progress live. For more information about extended events, see [Extended Events overview](../extended-events/extended-events.md).

docs/t-sql/statements/alter-database-transact-sql-set-options.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -624,6 +624,9 @@ Controls the date_correlation_optimization option.
624624

625625
[!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] maintains correlation statistics where a FOREIGN KEY constraint links any two tables in the database and the tables have **datetime** columns.
626626

627+
Enabling `DATE_CORRELATION_OPTIMIZATION` increases the attack surface area when restoring [untrusted backup](../../relational-databases/backup-restore/back-up-and-restore-of-sql-server-databases.md#security-risk-of-restoring-backups-from-untrusted-sources) as the optimizer executes those objects with elevated privileges.
628+
629+
627630
- OFF
628631

629632
Correlation statistics aren't maintained.

0 commit comments

Comments
 (0)