MySQL_Security_Best_Practices_0815
MySQL_Security_Best_Practices_0815
60%
Of all targeted attacks struck
targeted by attackers in
small and medium sized
2014. 40% increase over
organizations.
2013.
Authorization
Firewall
Auditing
Security
SSL/TLS Block Threats
Firewall &
Public Key Encryption Auditing
Auditing
Private Key Regulatory Compliance
Digital Signatures Login and Query Activities
• Custom Authentication
MySQL Installer for Windows includes various Security Setup and Hardening Steps
Instance
1 ALLOW
Web
Inbound 2 BLOCK
Applications
SQL Traffic
3 DETECT
ALLOW
1 ALLOW – Execute SQL Allows “Matching” SQL In Whitelist Table
- SQL Matches Whitelist
Table
Table
Table
Table
Detect Detect or
protect mode
Protect
Applications
Applications Applications
Applications