DBA - SQL Server Security Best Practices
DBA - SQL Server Security Best Practices
C:RETRO ROO>
Keywords:
By David K. Sutton ATARI XEGS
audit backup best REBOOT, PART
practices business
continuity database DBA 1: 8-BIT
disaster recovery security NOSTALGIA
SQL sysadmin October 7th,
0 Comments 2016
Decades in the
Tweet this Post making, now the
moment of truth.
Plugs seated, power
anchor dropped,
and after a not- [...]
FIX: GOOGLE
CHROME SLOW
Secure Passwords: SCROLLING ON
What You’ve Been MACBOOK
Taught Is Wrong As part of an internal security review, I put together the October 5th,
2016
following best practices guideline to secure SQL servers.
This fix may work
SHARE THIS POST This is just an example, and is not meant to be a on other platforms,
but I can only verify
comprehensive list of SQL server security parameters. that it works on
my 2013 MacBook
START HERE Air run [...]
DATABASE CREATION AND CHANGES
Raving Roo is a tech
WINDOWS 2012
blog covering IT
New databases must be requested using a SQL database R2 REMOTE
topics including
Windows, Mac, Active request form with proper documentation including DESKTOP IS A
BLACK SCREEN
Directory, and application owner, purpose, etc. Refer to my blog post WITH COMMAND
information security.
And we also feature
(“DBA: Create A SQL Server Database Request Form For PROMPT ONLY
August 31st,
craft beer reviews! Auditing, Change Tracking And Security“) for a
2016
database request form example.
To get started, check If you ever find
out today's most yourself in a
Database changes (example: moving a database to a situation where
popular posts, browse
our categories, or different SQL server) should also be requested via the Windows Server
2012 R2 decides to
perform a search: SQL database request form. This will also serve to spontaneously
switc [...]
POPULAR TODAY
document existing databases and their purpose.
If given the option, name new databases descriptively.
Car Won't Start? Is It
Parked On A Hill? (Some applications may not allow for custom names) MERGE MP3
How To: Transparent FILES USING
Terminal Window In
https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/ 1/5
11/22/21, 7:38 PM DBA: SQL Server Security Best Practices
Mac OS X NEVER use the SQL SA account (or any account with SA CAT COMMAND
ON MAC OS X
Mac: How To Display equivalence) as a service account for application access to February 24th,
Photo Slideshow
Using OS X Finder
a database. 2016
Are you looking for
Create a unique SQL login account (“service account”) for a super quick way
CATEGORIES each application with a descriptive name and a secure to merge multiple
MP3 files into one
Active Directory password (example: no dictionary words, at least 10 big MP3 file? This
can be [...]
Citrix XenApp characters in length with a combination of lower case,
CSS upper case, numbers and symbols). FIX: CORRUPT
WINDOWS 2012
Exchange
If you do not enforce a password change policy on SQL RDS BASIC
Featured Beer COLOR SCHEME
accounts used by applications (“service accounts”) then
Gaming January 18th,
devise a manual process of regular password changes for 2016
Google Chrome
each account. This is a bizarre
How To
issue that has
iOS Most service accounts have full database access, but if this happened on
multiple occasions
IT How To is not necessary, limit access to the level required. with Windows 2012
IT Security servers in a
Remot [...]
Linux
Mac SECURITY AUDITING IPHONE / MAC
Movies TEXT
REPLACEMENT:
Office Each SQL server should have an internal audit conducted
SHORTCUTS
Office 365 quarterly using an internal audit procedure. Refer to my FOR PHRASES
Photography blog post (“DBA: SQL Audit Checklist For Internal January 10th,
2016
Privacy Security Review“) for an example of a checklist you can
Retro Roo use to audit your SQL servers. In both iOS and
Mac OS X, Apple
Sports offers a feature
Maintain unique copies of the checklist for each SQL called Text
SQL Replacement that
server and each quarterly audit for reference. allows you to
Technology
configur [...]
Television Checklist items must be re-produced for each audit. (Do
VMware not copy and paste) HOW TO EDIT
Windows GOOGLE
lynda.com online Limit the number of employees who have administrative quicker methods to
copy-paste
training tutorials access via VMware console (or other virtual console) and formatted text as
unformatted text in
Remote Desktop Services.
Microsoft Office
Ou [...]
Consider limiting OS administrator access to only SQL
admins (via AD group and Group Policy Object).
FOLLOW US
https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/ 2/5
11/22/21, 7:38 PM DBA: SQL Server Security Best Practices
Change the default SA account password to a secure Decades in the making, now
password (example: no dictionary words, at least 10 the moment of truth. Plugs
characters in length with a combination of lower case, seated, power anchor
upper case, numbers and symbols). dropped, and after a not-so-
confident yielding press of a
Consider renaming or disabling the SA account. bloated candy-like teal button
and subsequent moment of
Only use named user accounts for SQL administrative silence, one thought remains:
purposes. (No shared accounts) I need proof of life. But,
suddenly the room is quiet no
Limit SQL SA equivalent access to SQL admins only. (Use
more. Ah yes, I remember tha
AD group mentioned in Section 4) sound! An unsophisticated bu
satisfying reminiscent rumble
Only use SQL login accounts (“service accounts”) for
emanates out the speaker of
applications. an old cathode ray tube. [
Only assign permissions necessary for SQL accounts to 1 342 more word ]
/ photo by jimgris
0 Comments
Add a comment...
https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/ 4/5
11/22/21, 7:38 PM DBA: SQL Server Security Best Practices
LOG IN WITH
OR SIGN UP WITH DISQUS ?
Name
Get The Roo In Your Inbox HOME DECODED BEER CONTACT ABOUT
Email Address
Subscribe
https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/ 5/5