SlideShare a Scribd company logo
1 of 45
Download to read offline
Hardening a SQL Server 2008
       Implementation

  Ross Mistry, Principal Consultant,
   Convergent Computing (CCO)
Ross Mistry – Bio Summary
 Ross Mistry, Principal Consultant & Partner w/ Convergent Computing (CCO)
 Convergent Computing, CCO is located in the San Francisco Bay Area / Silicon Valley.
 Specialize in SQL Server Database Administration, High Availability, Active Directory,
Exchange, and Operations Manager
 Lead Author on “SQL Server 2005 Management and Administration” Based on Service
Pack 2
 Co-Author on “Windows Server 2008 Unleashed”
 Contributing Writer on “Exchange Server 2007 Unleashed” and “SharePoint Server
2007 Unleashed”
 Technical Editor on “SQL 2005 Unleashed” and “SQL 2005 Changing the Paradigm”
 Upcoming Books “SQL Server 2008 Management and Administration”
 Frequent Speaker for PASS, Connections and SQL User Groups
 Blog Site: http://www.networkworld.com/community/mistry




                                                                                           3
Topics
   Purpose & Challenges
   General Hardening and Security Techniques
   Security Configuration Tools
   Encryption




                                                4
Purpose of Securing Data and it’s
Challenges
   Data Explosion
   Hosts Mission Critical Information
   Repository for Sensitive Data
   Regulatory Compliance
   Responsible DBA
   Job Security
   Where do I start?




                                         5
General Hardening and Security
         Techniques

            PART 1
Understanding Authentication
Windows Authentication
   • Default Setting
   • Leverages Active Directory Accounts / Groups
   • User & Service Accounts are governed by Active Directory
     Policies
   • Active Directory Audit Policies are Applied
   • Multiple Password Policies – W2K8 Enhancement
      • Domain Level Must be Windows Server 2008
      • Only one set of passwords can be applied
   • Kerberos Available with ALL protocols – SQL2K8 Enhancement




                                                                  7
Understanding Authentication Cont’d
SQL Server Authentication (Mixed Mode)
   • Leverages AD or SQL Server Accounts
   • SQL Server continues to offer Password and Lockout Policies
     based on the following items:

                                              Password Complexity


                                              Password Expiration


                                                Account Lockouts


                                              Force Users to Change
                                             Password on Next Logon




                                                                      8
Which Authentication Mode Should I
Select?

Windows Authentication is Recommended
  • Additional Level of Protection w Kerberos
  • More Mature and Robust
  • Best Practice – If possible use Windows Authentication


Mixed Mode may be Required
  • Need to Support Legacy Applications / Clients
  • Separation of Duties




                                                             9
SQL Server Account Policies
Screenshots




                              10
Hardening the SA Account
 Enforce a Strong Password:


                       Uppercase
                          &           Length
                       Lowercase

                                       Non
                       Contain
                                   Alphanumeric
                       Numbers
                                    Characters




 Disable and Rename the SA Account
 Best Practice – Do NOT use SA for Daily Admin or for
Application Authentication – BIG NO NO!!!!


                                                         11
Hardening SQL Server Service
Accounts

 Security Context:
    Domain
    Local
    Built-In
 Understand the Limitations
 Use the Principle of Least Privilege
 Service Account Isolation
 Best Practice – Use Configuration Tools to make Service
Account Changes




                                                            12
Ongoing Patch Management


 Install Service Packs and Critical Fixes
 Test in Isolated Lab
 Patch Management Strategies:
    • Microsoft Update
    • Download and Install
    • Automate with System Center Configuration Manager 2007 or
      WSUS
   Best Practice – Patch as soon as possible and Backup
    System before Patching




                                                                  13
Leverage SQL Server Security Logs


Understanding the Types of Logs Available:
   •   None
   •   Successful Logins Only
   •   Failed Logins Only
   •   Both Failed and Successful Logins
Best Practice – Capture both Failed and Successful Logins
    and use a Solution such as ACS w System Center
    Operations Manager 2007 to Centralize Logging




                                                            14
SQL Server Security Logs Screen Shot




                                       15
Enhanced Auditing Functionality


• Log Every SQL Server Action
• Two New Auditing Objects:
    • Audit Object
    • Audit Specification Object
•       Save Actions to:
    •     Windows Application Log
    •     Windows Security Log
    •     File
• Consolidate to Satisfy Compliance




                                      16
Enhanced Auditing Process


•   Create Audit & Specify a Location
•   Create One or More Audit Specifications
•   Select a SQL Server Audit Action – 35 Groups
•   Review Audit Logs




                                                   17
Use a Firewall to Filter Unwanted
Traffic
   Enable Firewall
   Place Server on Dedicated VLAN
   Integrated Windows Server 2008 Firewall is Sufficient
   New w Windows Server 2008
    • Supports both Inbound & Outbound Rules
    • Integrated with Server Manager
    • Dynamic Control with Group Policies
 If More Advanced is required then use ISA 2006




                                                            18
Network Connectivity Best Practices
   Limit the Network Protocols Supported
   Do not expose SQL Server to the Internet
   Use Specific Port Assignments
   Use SSL when using SQL Authentication
   Use “Allow Only Encrypted Connections”




                                               19
Built-in / Administrators Group
   In the Past, this group had full control
   Allows all Local Administrators Full Access
   No longer Associated with the SysAdmin Role
   Best Practice
     Delete the Group
     Have a Backdoor




                                                  20
SQL Server Browser Service
   Listens to Incoming Requests
   Provides Instance Name, Port and Version Number
   Best Practice – Disable Service
   Manually Pass SQL information when connecting




                                                      21
DEMONSTRATIONS
   General Hardening and Security
            Techniques




                                    22
Security Configuration Tools

           PART 2
SQL Server Configuration Manager
Tool

Lock Down
  •   Services
  •   Network Configurations
  •   Native Client Configurations
  •   Client Protocols
  •   Aliases
  •   Hide Instances




                                     24
Configuration Manager Tool Screen
Shots




                                    25
Reducing SQL Server Surface Area
 SQL Server Tasks During and After Installation
   • Install required components
   • Configure and Lock Down Unnecessary Services
   • Remove / Disable Unnecessary Features
 SAC has been depreciated in SQL Server 2008
 Replaced with Policy Based Management
 Best Practice – ONLY INSTALL WHAT YOU NEED!!!!




                                                    26
Policy Based Management

   Based on DMF Framework included in SQL Server 2008
   Create Configuration Policies for the Database Engine
   Replaces deprecated SAC Tool
   Reasons for Policy Based Management:
    •   Centralized Administration is more common
    •   Data Center Consolidation
    •   Proliferation of SQL Server instances and remote databases
    •   Reduce complexity for managing many servers




                                                                     27
Policy Based Management
Components
                        Policy
                      Management




         Explicit
                                   Execution Modes
     Administration



                                                     28
Policy Based Management Process

         • Select a Policy-Based Management facet
     1

         • Define a Condition
     2

         • Define a Policy that Contains the Condition
     3

         • Validate Compliance against Policy
     4




                                                         29
Policy Based Management Execution
Modes

                     On Demand




                                        On
            On
                                      Change -
         Schedule
                                      Prevent



                    On Change - Log
                         Only




                                                 30
Hardening with Security Configuration
Wizard

 Included with Windows Server 2003 SP1 and / or
Windows Server 2008
 Build Custom Role Templates
 Integrate Templates with Active Directory
 Best Practice – Convert XML Template to GPO and Link
to OU
 Scwcmd.exe




                                                         31
Using Microsoft Baseline Security
Analyzer (MBSA)

Free download tool from MS
Identifies Security Vulnerabilities:
   •   User Accounts
   •   Missing Patches
   •   Weak Passwords
Caveat –SQL Server 2008 or Windows Server
2008 is not yet supported




                                            32
SQL Server Best Practice Analyzer

Free download tool from Microsoft
Scans SQL Server Components
Identifies Common Configuration Anomalies
Best Practice – Schedule on a Periodic Basis such
as once a Month
Caveat – BPA for SQL Server 2008 has not been
released




                                                    33
IIS 7.0 & Lockdown Tool

IIS 7.0 on Windows Server 2008 is Slim and
Efficient
Modular Based Installation with Roles & Features
Templates Readily Available
Best Practice - Only Install Required Features for
SSRS




                                                     34
IIS 7.0 Features Installation
Screenshot




                                35
Demonstrations
       Security Configuration Tools




                                      36
Securing Physical Data including
        Data in Transit



             PART 3
SQL Server 2008 Data Encryption

Supports Native Encryption out of the box
Encryption can be applied at the:
  •   Database Level
  •   Granular - Cell Level
  •   Data in Transit
  •   Authentication
  •   File Folder
  •   Hard disks




                                            38
Types of SQL Server 2008 Encryption

 Extensible Key Management (EKM) -     SQL2K8 Enhancement



 Transparent Data Encryption (TPE) –   SQL2K8 Enhancement




                                                             39
Transparent Data Encryption Process
   Create Master Key
   Create Certificate
   Create Database, Encryption Key
   Alter Database…, Set Encryption On




                                         40
Types of SQL Server 2008 Encryption
Con’t

 Bitlocker Drive Encryption – W2K8 Enhancement

 Use PKI to secure Data in Transit

 Use SSL to secure SQL User Account Authentication

 EFS can be used to protect data at the folder level




                                                        41
Demonstrations
                 Data Encryption




                                   42
Resources
 SQL Server 2005 Management & Administration
   • Covers Administration, Monitoring, Management and Security
   • 3 Chapters Dedicated to Security
   • Available on amazon.com
 Windows Server 2008 Unleashed
   • Available on amazon.com
 SQL Server 2008 Management & Administration
   • Scheduled for September 2008 Release Date




                                                                  43
Questions?
Thank you!

More Related Content

What's hot

Basic security and Barracuda VRS
Basic security and Barracuda VRSBasic security and Barracuda VRS
Basic security and Barracuda VRSAravindan A
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overviewleanne_abarro
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
Barracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft AzureBarracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft AzureAravindan A
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterVishwas Manral
 
Barracuda WAF deployment in AWS
Barracuda WAF deployment in AWSBarracuda WAF deployment in AWS
Barracuda WAF deployment in AWSAravindan A
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
SSO with the WSO2 Identity Server
SSO with the WSO2 Identity ServerSSO with the WSO2 Identity Server
SSO with the WSO2 Identity ServerWSO2
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiNCCOMMS
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAAdkaya
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.stableproxies
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemRuncy Oommen
 
Azure network and infrastructure
Azure network and infrastructureAzure network and infrastructure
Azure network and infrastructurePhi Huynh
 
Server update management optimization
Server update management optimizationServer update management optimization
Server update management optimizationAllen Brokken
 

What's hot (20)

Basic security and Barracuda VRS
Basic security and Barracuda VRSBasic security and Barracuda VRS
Basic security and Barracuda VRS
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overview
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
Cryptzone AppGate Technical Architecture
Cryptzone AppGate Technical ArchitectureCryptzone AppGate Technical Architecture
Cryptzone AppGate Technical Architecture
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Barracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft AzureBarracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft Azure
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
 
Barracuda WAF deployment in AWS
Barracuda WAF deployment in AWSBarracuda WAF deployment in AWS
Barracuda WAF deployment in AWS
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
SSO with the WSO2 Identity Server
SSO with the WSO2 Identity ServerSSO with the WSO2 Identity Server
SSO with the WSO2 Identity Server
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Designing A Platform Agnostic HA System
Designing A Platform Agnostic HA SystemDesigning A Platform Agnostic HA System
Designing A Platform Agnostic HA System
 
Azure network and infrastructure
Azure network and infrastructureAzure network and infrastructure
Azure network and infrastructure
 
Server update management optimization
Server update management optimizationServer update management optimization
Server update management optimization
 
Iuwne10 S04 L03
Iuwne10 S04 L03Iuwne10 S04 L03
Iuwne10 S04 L03
 
Proxy
ProxyProxy
Proxy
 

Viewers also liked

Herramientas Monitoreo SQL Server
Herramientas Monitoreo SQL Server Herramientas Monitoreo SQL Server
Herramientas Monitoreo SQL Server Adrian Miranda
 
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...Sergio E. Sánchez
 
Administrando SQL Server, mejores practicas para un DBA
Administrando SQL Server, mejores practicas para un DBAAdministrando SQL Server, mejores practicas para un DBA
Administrando SQL Server, mejores practicas para un DBASpanishPASSVC
 
Lo que siempre has querido saber para exprimir sql server
Lo que siempre has querido saber para exprimir sql serverLo que siempre has querido saber para exprimir sql server
Lo que siempre has querido saber para exprimir sql serverEnrique Catala Bañuls
 
SQL Tutorial - Basic Commands
SQL Tutorial - Basic CommandsSQL Tutorial - Basic Commands
SQL Tutorial - Basic Commands1keydata
 

Viewers also liked (6)

Herramientas Monitoreo SQL Server
Herramientas Monitoreo SQL Server Herramientas Monitoreo SQL Server
Herramientas Monitoreo SQL Server
 
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...
HERRAMIENTAS DE CONTROL DE MONITOREO Y ESTADISTICAS DE ACCESO A BASE DE DATOS...
 
Administrando SQL Server, mejores practicas para un DBA
Administrando SQL Server, mejores practicas para un DBAAdministrando SQL Server, mejores practicas para un DBA
Administrando SQL Server, mejores practicas para un DBA
 
Lo que siempre has querido saber para exprimir sql server
Lo que siempre has querido saber para exprimir sql serverLo que siempre has querido saber para exprimir sql server
Lo que siempre has querido saber para exprimir sql server
 
Sql Server Basics
Sql Server BasicsSql Server Basics
Sql Server Basics
 
SQL Tutorial - Basic Commands
SQL Tutorial - Basic CommandsSQL Tutorial - Basic Commands
SQL Tutorial - Basic Commands
 

Similar to Hardening a SQL Server 2008 Implementation

SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsHostway|HOSTING
 
Sql dba 2008 r2 online training
Sql dba 2008 r2 online trainingSql dba 2008 r2 online training
Sql dba 2008 r2 online trainingsssql
 
Professional sql server dba online training
Professional sql server dba online trainingProfessional sql server dba online training
Professional sql server dba online trainingsssql
 
SQL Server 2008 Migration
SQL Server 2008 MigrationSQL Server 2008 Migration
SQL Server 2008 MigrationMark Ginnebaugh
 
Sql server 2012 dba online training
Sql server 2012 dba online trainingSql server 2012 dba online training
Sql server 2012 dba online trainingsqlmasters
 
Webmetrics Performance Monitoring
Webmetrics Performance MonitoringWebmetrics Performance Monitoring
Webmetrics Performance Monitoringesampsel
 
Webmetrics Overview
Webmetrics OverviewWebmetrics Overview
Webmetrics Overviewedimberu
 
Sql server dba certification
Sql server dba certificationSql server dba certification
Sql server dba certificationsssql
 
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Blackboard APAC
 
Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.Rolta
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingAntonios Chatzipavlis
 
Online sql dba training
Online sql dba trainingOnline sql dba training
Online sql dba trainingssmasters
 
Sql server 2012 dba online training
Sql server 2012 dba online trainingSql server 2012 dba online training
Sql server 2012 dba online trainingsssql
 
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360Advanced Application Monitoring and Management in Microsoft Azure with KEMP360
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360Kemp
 
ArcSight Management Center 2.5 Administrator's Guide
ArcSight Management Center 2.5 Administrator's Guide	ArcSight Management Center 2.5 Administrator's Guide
ArcSight Management Center 2.5 Administrator's Guide Protect724mouni
 
Administrators manual
Administrators manualAdministrators manual
Administrators manualScrumDesk
 
Administrators manual
Administrators manualAdministrators manual
Administrators manualScrumDesk
 
Sage 300 ERP: Environment setup and configuration
Sage 300 ERP: Environment setup and configurationSage 300 ERP: Environment setup and configuration
Sage 300 ERP: Environment setup and configurationSage 300 ERP CS
 

Similar to Hardening a SQL Server 2008 Implementation (20)

SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
 
Sql dba 2008 r2 online training
Sql dba 2008 r2 online trainingSql dba 2008 r2 online training
Sql dba 2008 r2 online training
 
Professional sql server dba online training
Professional sql server dba online trainingProfessional sql server dba online training
Professional sql server dba online training
 
SQL Server 2008 Migration
SQL Server 2008 MigrationSQL Server 2008 Migration
SQL Server 2008 Migration
 
Sql server 2012 dba online training
Sql server 2012 dba online trainingSql server 2012 dba online training
Sql server 2012 dba online training
 
Webmetrics Performance Monitoring
Webmetrics Performance MonitoringWebmetrics Performance Monitoring
Webmetrics Performance Monitoring
 
Webmetrics Overview
Webmetrics OverviewWebmetrics Overview
Webmetrics Overview
 
Webmetrics
WebmetricsWebmetrics
Webmetrics
 
Sql server dba certification
Sql server dba certificationSql server dba certification
Sql server dba certification
 
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...Building block development in managed hosting - Angelo Rossi, Manager, Comple...
Building block development in managed hosting - Angelo Rossi, Manager, Comple...
 
Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.Oracle Enterprise Manager 12c: updates and upgrades.
Oracle Enterprise Manager 12c: updates and upgrades.
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
 
Online sql dba training
Online sql dba trainingOnline sql dba training
Online sql dba training
 
Sql server 2012 dba online training
Sql server 2012 dba online trainingSql server 2012 dba online training
Sql server 2012 dba online training
 
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360Advanced Application Monitoring and Management in Microsoft Azure with KEMP360
Advanced Application Monitoring and Management in Microsoft Azure with KEMP360
 
ArcSight Management Center 2.5 Administrator's Guide
ArcSight Management Center 2.5 Administrator's Guide	ArcSight Management Center 2.5 Administrator's Guide
ArcSight Management Center 2.5 Administrator's Guide
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Administrators manual
Administrators manualAdministrators manual
Administrators manual
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Sage 300 ERP: Environment setup and configuration
Sage 300 ERP: Environment setup and configurationSage 300 ERP: Environment setup and configuration
Sage 300 ERP: Environment setup and configuration
 

More from Mark Ginnebaugh

Automating Microsoft Power BI Creations 2015
Automating Microsoft Power BI Creations 2015Automating Microsoft Power BI Creations 2015
Automating Microsoft Power BI Creations 2015Mark Ginnebaugh
 
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction Mark Ginnebaugh
 
Platfora - An Analytics Sandbox In A World Of Big Data
Platfora - An Analytics Sandbox In A World Of Big DataPlatfora - An Analytics Sandbox In A World Of Big Data
Platfora - An Analytics Sandbox In A World Of Big DataMark Ginnebaugh
 
Microsoft SQL Server Relational Databases and Primary Keys
Microsoft SQL Server Relational Databases and Primary KeysMicrosoft SQL Server Relational Databases and Primary Keys
Microsoft SQL Server Relational Databases and Primary KeysMark Ginnebaugh
 
DesignMind Microsoft Business Intelligence SQL Server
DesignMind Microsoft Business Intelligence SQL ServerDesignMind Microsoft Business Intelligence SQL Server
DesignMind Microsoft Business Intelligence SQL ServerMark Ginnebaugh
 
San Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetingsSan Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetingsMark Ginnebaugh
 
Silicon Valley SQL Server User Group June 2013
Silicon Valley SQL Server User Group June 2013Silicon Valley SQL Server User Group June 2013
Silicon Valley SQL Server User Group June 2013Mark Ginnebaugh
 
Microsoft SQL Server Continuous Integration
Microsoft SQL Server Continuous IntegrationMicrosoft SQL Server Continuous Integration
Microsoft SQL Server Continuous IntegrationMark Ginnebaugh
 
Hortonworks Big Data & Hadoop
Hortonworks Big Data & HadoopHortonworks Big Data & Hadoop
Hortonworks Big Data & HadoopMark Ginnebaugh
 
Microsoft SQL Server Physical Join Operators
Microsoft SQL Server Physical Join OperatorsMicrosoft SQL Server Physical Join Operators
Microsoft SQL Server Physical Join OperatorsMark Ginnebaugh
 
Microsoft PowerPivot & Power View in Excel 2013
Microsoft PowerPivot & Power View in Excel 2013Microsoft PowerPivot & Power View in Excel 2013
Microsoft PowerPivot & Power View in Excel 2013Mark Ginnebaugh
 
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball Approach
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball ApproachMicrosoft Data Warehouse Business Intelligence Lifecycle - The Kimball Approach
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball ApproachMark Ginnebaugh
 
Fusion-io Memory Flash for Microsoft SQL Server 2012
Fusion-io Memory Flash for Microsoft SQL Server 2012Fusion-io Memory Flash for Microsoft SQL Server 2012
Fusion-io Memory Flash for Microsoft SQL Server 2012Mark Ginnebaugh
 
Microsoft Data Mining 2012
Microsoft Data Mining 2012Microsoft Data Mining 2012
Microsoft Data Mining 2012Mark Ginnebaugh
 
Microsoft SQL Server PASS News August 2012
Microsoft SQL Server PASS News August 2012Microsoft SQL Server PASS News August 2012
Microsoft SQL Server PASS News August 2012Mark Ginnebaugh
 
Business Intelligence Dashboard Design Best Practices
Business Intelligence Dashboard Design Best PracticesBusiness Intelligence Dashboard Design Best Practices
Business Intelligence Dashboard Design Best PracticesMark Ginnebaugh
 
Microsoft Mobile Business Intelligence
Microsoft Mobile Business Intelligence Microsoft Mobile Business Intelligence
Microsoft Mobile Business Intelligence Mark Ginnebaugh
 
Microsoft SQL Server 2012 Cloud Ready
Microsoft SQL Server 2012 Cloud ReadyMicrosoft SQL Server 2012 Cloud Ready
Microsoft SQL Server 2012 Cloud ReadyMark Ginnebaugh
 
Microsoft SQL Server 2012 Master Data Services
Microsoft SQL Server 2012 Master Data ServicesMicrosoft SQL Server 2012 Master Data Services
Microsoft SQL Server 2012 Master Data ServicesMark Ginnebaugh
 
Microsoft SQL Server PowerPivot
Microsoft SQL Server PowerPivotMicrosoft SQL Server PowerPivot
Microsoft SQL Server PowerPivotMark Ginnebaugh
 

More from Mark Ginnebaugh (20)

Automating Microsoft Power BI Creations 2015
Automating Microsoft Power BI Creations 2015Automating Microsoft Power BI Creations 2015
Automating Microsoft Power BI Creations 2015
 
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction
Microsoft SQL Server Analysis Services (SSAS) - A Practical Introduction
 
Platfora - An Analytics Sandbox In A World Of Big Data
Platfora - An Analytics Sandbox In A World Of Big DataPlatfora - An Analytics Sandbox In A World Of Big Data
Platfora - An Analytics Sandbox In A World Of Big Data
 
Microsoft SQL Server Relational Databases and Primary Keys
Microsoft SQL Server Relational Databases and Primary KeysMicrosoft SQL Server Relational Databases and Primary Keys
Microsoft SQL Server Relational Databases and Primary Keys
 
DesignMind Microsoft Business Intelligence SQL Server
DesignMind Microsoft Business Intelligence SQL ServerDesignMind Microsoft Business Intelligence SQL Server
DesignMind Microsoft Business Intelligence SQL Server
 
San Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetingsSan Francisco Bay Area SQL Server July 2013 meetings
San Francisco Bay Area SQL Server July 2013 meetings
 
Silicon Valley SQL Server User Group June 2013
Silicon Valley SQL Server User Group June 2013Silicon Valley SQL Server User Group June 2013
Silicon Valley SQL Server User Group June 2013
 
Microsoft SQL Server Continuous Integration
Microsoft SQL Server Continuous IntegrationMicrosoft SQL Server Continuous Integration
Microsoft SQL Server Continuous Integration
 
Hortonworks Big Data & Hadoop
Hortonworks Big Data & HadoopHortonworks Big Data & Hadoop
Hortonworks Big Data & Hadoop
 
Microsoft SQL Server Physical Join Operators
Microsoft SQL Server Physical Join OperatorsMicrosoft SQL Server Physical Join Operators
Microsoft SQL Server Physical Join Operators
 
Microsoft PowerPivot & Power View in Excel 2013
Microsoft PowerPivot & Power View in Excel 2013Microsoft PowerPivot & Power View in Excel 2013
Microsoft PowerPivot & Power View in Excel 2013
 
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball Approach
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball ApproachMicrosoft Data Warehouse Business Intelligence Lifecycle - The Kimball Approach
Microsoft Data Warehouse Business Intelligence Lifecycle - The Kimball Approach
 
Fusion-io Memory Flash for Microsoft SQL Server 2012
Fusion-io Memory Flash for Microsoft SQL Server 2012Fusion-io Memory Flash for Microsoft SQL Server 2012
Fusion-io Memory Flash for Microsoft SQL Server 2012
 
Microsoft Data Mining 2012
Microsoft Data Mining 2012Microsoft Data Mining 2012
Microsoft Data Mining 2012
 
Microsoft SQL Server PASS News August 2012
Microsoft SQL Server PASS News August 2012Microsoft SQL Server PASS News August 2012
Microsoft SQL Server PASS News August 2012
 
Business Intelligence Dashboard Design Best Practices
Business Intelligence Dashboard Design Best PracticesBusiness Intelligence Dashboard Design Best Practices
Business Intelligence Dashboard Design Best Practices
 
Microsoft Mobile Business Intelligence
Microsoft Mobile Business Intelligence Microsoft Mobile Business Intelligence
Microsoft Mobile Business Intelligence
 
Microsoft SQL Server 2012 Cloud Ready
Microsoft SQL Server 2012 Cloud ReadyMicrosoft SQL Server 2012 Cloud Ready
Microsoft SQL Server 2012 Cloud Ready
 
Microsoft SQL Server 2012 Master Data Services
Microsoft SQL Server 2012 Master Data ServicesMicrosoft SQL Server 2012 Master Data Services
Microsoft SQL Server 2012 Master Data Services
 
Microsoft SQL Server PowerPivot
Microsoft SQL Server PowerPivotMicrosoft SQL Server PowerPivot
Microsoft SQL Server PowerPivot
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Hardening a SQL Server 2008 Implementation

  • 1.
  • 2. Hardening a SQL Server 2008 Implementation Ross Mistry, Principal Consultant, Convergent Computing (CCO)
  • 3. Ross Mistry – Bio Summary  Ross Mistry, Principal Consultant & Partner w/ Convergent Computing (CCO)  Convergent Computing, CCO is located in the San Francisco Bay Area / Silicon Valley.  Specialize in SQL Server Database Administration, High Availability, Active Directory, Exchange, and Operations Manager  Lead Author on “SQL Server 2005 Management and Administration” Based on Service Pack 2  Co-Author on “Windows Server 2008 Unleashed”  Contributing Writer on “Exchange Server 2007 Unleashed” and “SharePoint Server 2007 Unleashed”  Technical Editor on “SQL 2005 Unleashed” and “SQL 2005 Changing the Paradigm”  Upcoming Books “SQL Server 2008 Management and Administration”  Frequent Speaker for PASS, Connections and SQL User Groups  Blog Site: http://www.networkworld.com/community/mistry 3
  • 4. Topics  Purpose & Challenges  General Hardening and Security Techniques  Security Configuration Tools  Encryption 4
  • 5. Purpose of Securing Data and it’s Challenges  Data Explosion  Hosts Mission Critical Information  Repository for Sensitive Data  Regulatory Compliance  Responsible DBA  Job Security  Where do I start? 5
  • 6. General Hardening and Security Techniques PART 1
  • 7. Understanding Authentication Windows Authentication • Default Setting • Leverages Active Directory Accounts / Groups • User & Service Accounts are governed by Active Directory Policies • Active Directory Audit Policies are Applied • Multiple Password Policies – W2K8 Enhancement • Domain Level Must be Windows Server 2008 • Only one set of passwords can be applied • Kerberos Available with ALL protocols – SQL2K8 Enhancement 7
  • 8. Understanding Authentication Cont’d SQL Server Authentication (Mixed Mode) • Leverages AD or SQL Server Accounts • SQL Server continues to offer Password and Lockout Policies based on the following items: Password Complexity Password Expiration Account Lockouts Force Users to Change Password on Next Logon 8
  • 9. Which Authentication Mode Should I Select? Windows Authentication is Recommended • Additional Level of Protection w Kerberos • More Mature and Robust • Best Practice – If possible use Windows Authentication Mixed Mode may be Required • Need to Support Legacy Applications / Clients • Separation of Duties 9
  • 10. SQL Server Account Policies Screenshots 10
  • 11. Hardening the SA Account  Enforce a Strong Password: Uppercase & Length Lowercase Non Contain Alphanumeric Numbers Characters  Disable and Rename the SA Account  Best Practice – Do NOT use SA for Daily Admin or for Application Authentication – BIG NO NO!!!! 11
  • 12. Hardening SQL Server Service Accounts  Security Context:  Domain  Local  Built-In  Understand the Limitations  Use the Principle of Least Privilege  Service Account Isolation  Best Practice – Use Configuration Tools to make Service Account Changes 12
  • 13. Ongoing Patch Management  Install Service Packs and Critical Fixes  Test in Isolated Lab  Patch Management Strategies: • Microsoft Update • Download and Install • Automate with System Center Configuration Manager 2007 or WSUS  Best Practice – Patch as soon as possible and Backup System before Patching 13
  • 14. Leverage SQL Server Security Logs Understanding the Types of Logs Available: • None • Successful Logins Only • Failed Logins Only • Both Failed and Successful Logins Best Practice – Capture both Failed and Successful Logins and use a Solution such as ACS w System Center Operations Manager 2007 to Centralize Logging 14
  • 15. SQL Server Security Logs Screen Shot 15
  • 16. Enhanced Auditing Functionality • Log Every SQL Server Action • Two New Auditing Objects: • Audit Object • Audit Specification Object • Save Actions to: • Windows Application Log • Windows Security Log • File • Consolidate to Satisfy Compliance 16
  • 17. Enhanced Auditing Process • Create Audit & Specify a Location • Create One or More Audit Specifications • Select a SQL Server Audit Action – 35 Groups • Review Audit Logs 17
  • 18. Use a Firewall to Filter Unwanted Traffic  Enable Firewall  Place Server on Dedicated VLAN  Integrated Windows Server 2008 Firewall is Sufficient  New w Windows Server 2008 • Supports both Inbound & Outbound Rules • Integrated with Server Manager • Dynamic Control with Group Policies  If More Advanced is required then use ISA 2006 18
  • 19. Network Connectivity Best Practices  Limit the Network Protocols Supported  Do not expose SQL Server to the Internet  Use Specific Port Assignments  Use SSL when using SQL Authentication  Use “Allow Only Encrypted Connections” 19
  • 20. Built-in / Administrators Group  In the Past, this group had full control  Allows all Local Administrators Full Access  No longer Associated with the SysAdmin Role  Best Practice  Delete the Group  Have a Backdoor 20
  • 21. SQL Server Browser Service  Listens to Incoming Requests  Provides Instance Name, Port and Version Number  Best Practice – Disable Service  Manually Pass SQL information when connecting 21
  • 22. DEMONSTRATIONS General Hardening and Security Techniques 22
  • 24. SQL Server Configuration Manager Tool Lock Down • Services • Network Configurations • Native Client Configurations • Client Protocols • Aliases • Hide Instances 24
  • 25. Configuration Manager Tool Screen Shots 25
  • 26. Reducing SQL Server Surface Area  SQL Server Tasks During and After Installation • Install required components • Configure and Lock Down Unnecessary Services • Remove / Disable Unnecessary Features  SAC has been depreciated in SQL Server 2008  Replaced with Policy Based Management  Best Practice – ONLY INSTALL WHAT YOU NEED!!!! 26
  • 27. Policy Based Management  Based on DMF Framework included in SQL Server 2008  Create Configuration Policies for the Database Engine  Replaces deprecated SAC Tool  Reasons for Policy Based Management: • Centralized Administration is more common • Data Center Consolidation • Proliferation of SQL Server instances and remote databases • Reduce complexity for managing many servers 27
  • 28. Policy Based Management Components Policy Management Explicit Execution Modes Administration 28
  • 29. Policy Based Management Process • Select a Policy-Based Management facet 1 • Define a Condition 2 • Define a Policy that Contains the Condition 3 • Validate Compliance against Policy 4 29
  • 30. Policy Based Management Execution Modes On Demand On On Change - Schedule Prevent On Change - Log Only 30
  • 31. Hardening with Security Configuration Wizard  Included with Windows Server 2003 SP1 and / or Windows Server 2008  Build Custom Role Templates  Integrate Templates with Active Directory  Best Practice – Convert XML Template to GPO and Link to OU  Scwcmd.exe 31
  • 32. Using Microsoft Baseline Security Analyzer (MBSA) Free download tool from MS Identifies Security Vulnerabilities: • User Accounts • Missing Patches • Weak Passwords Caveat –SQL Server 2008 or Windows Server 2008 is not yet supported 32
  • 33. SQL Server Best Practice Analyzer Free download tool from Microsoft Scans SQL Server Components Identifies Common Configuration Anomalies Best Practice – Schedule on a Periodic Basis such as once a Month Caveat – BPA for SQL Server 2008 has not been released 33
  • 34. IIS 7.0 & Lockdown Tool IIS 7.0 on Windows Server 2008 is Slim and Efficient Modular Based Installation with Roles & Features Templates Readily Available Best Practice - Only Install Required Features for SSRS 34
  • 35. IIS 7.0 Features Installation Screenshot 35
  • 36. Demonstrations Security Configuration Tools 36
  • 37. Securing Physical Data including Data in Transit PART 3
  • 38. SQL Server 2008 Data Encryption Supports Native Encryption out of the box Encryption can be applied at the: • Database Level • Granular - Cell Level • Data in Transit • Authentication • File Folder • Hard disks 38
  • 39. Types of SQL Server 2008 Encryption  Extensible Key Management (EKM) - SQL2K8 Enhancement  Transparent Data Encryption (TPE) – SQL2K8 Enhancement 39
  • 40. Transparent Data Encryption Process  Create Master Key  Create Certificate  Create Database, Encryption Key  Alter Database…, Set Encryption On 40
  • 41. Types of SQL Server 2008 Encryption Con’t  Bitlocker Drive Encryption – W2K8 Enhancement  Use PKI to secure Data in Transit  Use SSL to secure SQL User Account Authentication  EFS can be used to protect data at the folder level 41
  • 42. Demonstrations Data Encryption 42
  • 43. Resources  SQL Server 2005 Management & Administration • Covers Administration, Monitoring, Management and Security • 3 Chapters Dedicated to Security • Available on amazon.com  Windows Server 2008 Unleashed • Available on amazon.com  SQL Server 2008 Management & Administration • Scheduled for September 2008 Release Date 43