<div><div>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulator
Securing SQL Server: DBAs Defending the Database
β Scribed by Peter A. Carter
- Publisher
- Apress
- Year
- 2018
- Tongue
- English
- Leaves
- 354
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.
Database professionals in todayβs world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your companyβs data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their companyβs SQL Server enterprise.
This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.
What You'll Learn
β’ Perform threat analysis
β’ Implement access level control and data encryption
β’ Avoid non-reputability by implementing comprehensive auditing
β’ Use security metadata to ensure your security policies are enforced
β’ Mitigate the risk of credentials being stolen
β’ Put countermeasures in place against common forms of attack
Who This Book Is For
Database administrators who need to understand and counteract the threat of attacks against their companyβs data, and useful for SQL developers and architects
β¦ Table of Contents
Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
Threat Analysis and Compliance (Peter A. Carter)....Pages 3-21
SQL Server Security Model (Peter A. Carter)....Pages 23-49
SQL Server Audit (Peter A. Carter)....Pages 51-76
Data-Level Security (Peter A. Carter)....Pages 77-96
Encryption in SQL Server (Peter A. Carter)....Pages 97-131
Security Metadata (Peter A. Carter)....Pages 133-157
Implementing Service Accounts for Security (Peter A. Carter)....Pages 159-174
Protecting Credentials (Peter A. Carter)....Pages 175-192
Reducing the Attack Surface (Peter A. Carter)....Pages 193-217
Front Matter ....Pages 219-219
SQL Injection (Peter A. Carter)....Pages 221-245
Hijacking an Instance (Peter A. Carter)....Pages 247-274
Database Backup Theft (Peter A. Carter)....Pages 275-306
Code Injection (Peter A. Carter)....Pages 307-324
Whole Value Substitution Attacks (Peter A. Carter)....Pages 325-339
Back Matter ....Pages 341-349
β¦ Subjects
Databases; Security; Penetration Testing; Relational Databases; Monitoring; Database Administration; Microsoft SQL Server; GDPR; Data Encryption; SQL Injection
π SIMILAR VOLUMES
<p>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead t
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab
<span>Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server datab
<p>SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.</p> <p>In <b><i>Securing SQL Server, Third Edition</i></b>, you will learn about the potential attack vec