Common SQL Server Security Mistakes
Common SQL Server Security Mistakes
Michael K. Campbell
Common Security Mistakes
Michael K. Campbell
Independent Consultant
Former DBA and Database Developer
Author, Contributing Editor, and Presenter
Contact
web: http://www.overachiever.net
email: [email protected]
twitter: AngryPets
In this Webcast
Focus
Core SQL Server Security Concepts
Horror Stories (and how to avoid them)
Road Map
Session Overview
Core SQL Server Security Concepts
Simultaneous Requests
LOGINS
(Users and Groups)
SQL Server
Managed Logins
(usernames/passwords)
Windows
Logins
(Trusted from OS)
SQL Server Authorization / Mapping
LOGINS
(Users and Groups)
Windows
Logins DB Level: Users and Roles
(Trusted from OS) (Mapped to Logins)
Core Security Concepts
Synopsis
Authorization:
Handled By SQL Server
Managed with Users and Roles
Authentication
User are Validated via:
The OS (Integrated Authentication)
The OS AND SQL Server (Mixed Mode-Authentication)
Attack Vectors
Threat Modeling / Threat Categories
STRIDE
Spoofing Identity
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege
Common Mistakes / Areas of Focus
Repudiation
Escalation
Circumvention
http://failblog.org/2009/02/28/
Repudiation
Examples
Bad Example: Overbearing Security Practices
Good Example: Banking
Negatives:
Waste of Security Attention/Effort
(Largely) Ignores Hackers
Makes Users Mistrust/Hate Security
Auditing Options
Built-In Options
SQL Server C2 Audit Mode (Deprecated)
SQL Server 2008 Auditing (Powerful/Versatile)
Triggers
Audit Changes (not access) to Data
Ensure users are denied access to Audits/Logs
3rd Party Solutions
Wide Variety of Solutions
Simple Auditing Solutions
Sometimes Simple Solutions are Enough
Simple Auditing Solutions
Troubleshooting:
Use Windows Event Logs.
SysInternals / Process Monitor.
Execution
Requires Reboot of SQL Server Service.
Plan Accordingly.
Monty Python: “Run Away! Run Away!”
The BADGER is an option.
Keep an Eye on Backups over next few days.
Least Privilege: Applications
http://failblog.org/2008/03/13/
COMMON MISTAKE:
Not Adjusting Disaster Recovery Plans
Properly Secured = Harder to Recover
Logins and Credentials.
Mappings to Users and Roles.
Certificates.
Encrypted Backups.
Test Your Backups
Regularly
Document