𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Securing SQL Server: Protecting Your Database from Attackers

✍ Scribed by Denny Cherry


Publisher
Syngress
Year
2012
Tongue
English
Leaves
385
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security.Presents hands-on techniques for protecting your SQL Server database from intrusion and attack.Provides the most in-depth coverage of all aspects of SQL Server database security

✦ Table of Contents


Securing SQL Server
Acknowledgements
Dedication
Author Biography
About the Technical Editor
Introduction
1 Securing the Network
Securing the Network
Network Firewalls
Web Server on the Public Internet Network
Web Server on the Internal Side of the Network
Web Server in the Demilitarized Zone
Server Firewalls
Windows Firewall Inbound Rules
Windows Firewall Outbound Rules
Special Requirements for Clustering
Direct Internet Access
Public IP Addresses versus Private IP Addresses
Accessing SQL Server from home
Physical Security
Keep Your Hands Off My Box
Open Network Ports
Unlocked Workstations
Automatically Locking Computers
Social engineering
Finding the Instances
Testing the Network Security
Summary
References
2 Database Encryption
Database Encryption
Hashing versus Encryption
Triple DES
RC Algorithms
AES
Hashing
SHA2 and SQL Server
Encrypting Objects
Encrypting data within tables
Encrypting within Microsoft SQL Server
Encrypting within the Application Tier
Encrypting data at rest
TDE and FILESTREAM
Log Shipping, Database Mirroring, and Always On
Key Protection
Encrypting data on the wire
SQL Server Over SSL
SQL Server 7 and 2000
SQL Server 2005 and Up
Certificate Strength Differences
Managing SSL Certificates
Hiding the Instance
IP Sec
Encrypting data with MPIO drivers
PowerPath Encryption with RSA Requirements and Setup
Encrypting data via HBAs
Summary
References
3 SQL Password Security
SQL Server Password Security
Extended Protection
SPNs
Strong Passwords
Contained Database Logins in SQL Server 2012
Encrypting Client Connection Strings
SQL Reporting Services
Application Roles
Using Windows Domain Policies to Enforce Password Length
Windows Authentication Group Policies
Windows Domain Requirements to Use Domain Policies to Manage SQL Authentication Logins
Contained Databases
Contained Databases and Auto Close
db_owners Can Now Add New Users to the Instance
Password Policies and Contained Users
Summary
References
4 Securing the Instance
What to Install, and When?
SQL Authentication and Windows Authentication
Editing the master.mdf File
Using a Debugger to Intercept Passwords
Purchased Products
Password Change Policies
Auditing Failed Logins
Renaming the SA Account
Disabling the SA Account
Securing Endpoints
Stored Procedures as a Security Measure
Access to Base Tables Isn’t Required
Enabling Cross Database Chaining
Minimum Permissions Possible
Instant File Initialization
Linked Servers
NTLM Double Hop Problems
Securing Linked Servers
Using SQL Server Management Studio for Linked Server Security Configuration
Using T-SQL for Linked Server Security Configuration
Only Allowing Some Groups to Use a Linked Server
Using Policies to Secure Your Instance
SQL Azure Specific Settings
Instances That Leave the Office
Securing β€œAlways On”
Securing Contained Databases
Contained Databases and Always On
Summary
5 Additional Security for an Internet Facing SQL Server and Application
SQL CLR
Extended Stored Procedures
Protecting Your Connection Strings
Database Firewalls
Clear Virtual Memory Pagefile
User Access Control (UAC)
Other Domain Policies to Adjust
Summary
6 Analysis Services
Logging into Analysis Services
Granting Administrative Rights
Granting Rights to an Analysis Services Database
Securing Analysis Services Objects
Data Sources
Cubes
Cell Data
Dimensions
Dimension Data
Mining Structures
Summary
7 Reporting Services
Setting up SSRS
Service Account
Web Service URL
Database
Report Manager URL
E-mail Settings
Execution Account
Encryption Keys
Scale-Out Deployment
Logging onto SQL Server Reporting Services for the first time
Security within Reporting Services
Item Roles
System Roles
Adding System Roles
Adding Folder Roles
Reporting Services Authentication Options
Anonymous Authentication
Forms Authentication
Security Within Reporting Services
Report Server Object Rights
Changing Permissions on an Object
Hiding Objects
Summary
8 SQL Injection Attacks
What is an SQL Injection Attack?
Why are SQL Injection attacks so successful?
How to Protect Yourself From an SQL Injection Attack
NET Protection Against SQL Injection
Protecting Dynamic SQL Within Stored Procedures from SQL Injection Attack
Using β€œEXECUTE AS” to Protect Dynamic SQL
Impersonating a Login
Impersonating a User
Removing Extended Stored Procedures
Not Using Best Practice Code Logic can Hurt You
What to Return to the End User
Database Firewalls
Test, Test, Test
Cleaning Up the Database After an SQL Injection Attack
Other Front-End Security Issues
The Web Browser URL is Not the Place for Sensitive Data
Using xEvents to Monitor For SQL Injection
Summary
Reference
9 Database Backup Security
Overwriting Backups
Deleting Old Backups
Media Set and Backup Set Passwords
Backup Encryption
LiteSpeed for SQL Server
Red Gate SQL HyperBac
Red Gate SQL Backup
Third-Party Tape Backup Solutions
Transparent Data Encryption
Securing the Certificates
Compression and Encryption
Encryption and Data Deduplication
Offsite Backups
Summary
References
10 Storage Area Network Security
Securing the Array
Locking Down the Management Ports
Authentication
User Access to the Storage Array
Locking Down the iSCSI Ports
LUN Security
Moving LUNs
Deleting LUNs
Snapshots and Clones
Securing the Storage Switches
Fiber Channel
iSCSI
Fiber Channel over Ethernet
Management Ports
Authentication
Zone Mapping
Summary
11 Auditing for Security
Login Auditing
SQL Server 2005 and Older
SQL Server 2008 and Newer
Using xEvents for Auditing Logins
Capturing Login Information
Event Loss Settings
Viewing Login Audits
Auditing sysadmin Domain Group Membership
Data Modification Auditing
Change Data Capture Configuration
Querying Changed Data
Using xEvents For Data Modification Auditing
Using SQL Server Audit for Data Modification
Data Querying Auditing
Schema Change Auditing
Using Extended Events for Schema Change Auditing
Using Policy-Based Management to Ensure Policy Compliance
C2 Auditing
Common Criteria Compliance
Summary
References
12 Server Rights
SQL Server Service Account Configuration
One Account for All Services
SQL Server 2012’s AlwaysOn
One Account Per Sever
One Account for Each Service
Using Local Service Accounts for Running SQL Server Services
Credentials
SQL Server Agent Proxy Accounts
OS Rights Needed by the SQL Server Service
Windows System Rights
SQL Server’s NTFS Permissions
OS Rights Needed by the DBA
Dual Accounts
OS Rights Needed to install service packs
OS Rights Needed to Access SSIS Remotely
Console Apps must die
Fixed-Server Roles
User Defined Server Roles
AlwaysOn
Instance Wide Permissions
Fixed Database Roles
Fixed Database Roles in the msdb Database
User Defined Database Roles
Default Sysadmin Rights
Vendor’s and the Sysadmin Fixed-Server Role
Summary
13 Securing Data
Granting Rights
Denying rights
REVOKEing rights
Column Level Permissions
Row Level Permissions
Summary
A External Audit Checklists
PCI DSS
PCI Checklist
Sarbanes-Oxley
Sarbanes-Oxley Checklist
HIPPA
HIPPA Checklist
Summary
Reference
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
Copyright


πŸ“œ SIMILAR VOLUMES


Securing SQL Server: Protecting Your Dat
✍ Denny Cherry πŸ“‚ Library πŸ“… 2011 πŸ› Syngress 🌐 English

There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab

Securing SQL Server, Third Edition: Prot
✍ Denny Cherry πŸ“‚ Library πŸ“… 2015 πŸ› Syngress 🌐 English

<p>SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.</p> <p>In <b><i>Securing SQL Server, Third Edition</i></b>, you will learn about the potential attack vec

Securing SQL Server, Third Edition: Prot
✍ Denny Cherry πŸ“‚ Library πŸ“… 2015 πŸ› Syngress 🌐 English

<p>SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.</p><p>In <b><i>Securing SQL Server, Third Edition</i></b>, you will learn about the potential attack vect

Securing SQL Server: DBAs Defending the
✍ Peter A. Carter πŸ“‚ Library πŸ“… 2018 πŸ› Apress 🌐 English

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirem

Securing SQL Server: DBAs Defending the
✍ Peter A. Carter πŸ“‚ Library πŸ“… 2018 πŸ› Apress 🌐 English

<div><div>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulator

Securing SQL Server: DBAs Defending the
✍ Peter A. Carter (auth.) πŸ“‚ Library πŸ“… 2016 πŸ› Apress 🌐 English

<p>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead t