SlideShare a Scribd company logo
SQL Server Security
sunit@sunitkanyan.in 1
sunit@sunitkanyan.in 2
Contents
 SQL Server
 Why security?
 SQL Server Security
 Authentication
 Authorization
 Securing.
 Do & Don’t.
sunit@sunitkanyan.in 3
SQL Server
RDBM by Microsoft
sunit@sunitkanyan.in 4
Why Security?
 Server Attack
 Port Scanning
 Instance Name Browsing
 Exposing Database Names
 Accessing administrative objects
 Data threats
 Data theft.
 Business logic theft.
 Database object change/drop.
sunit@sunitkanyan.in 5
SQL Server Security
Authentication
Authorization
sunit@sunitkanyan.in 6
Authentication
The process of verifying that user/person claiming is genuine or not
SQL Server supports two authentication modes.
 Windows authentication mode
 Mixed mode.
sunit@sunitkanyan.in 7
Window Authentication Mode
Windows authentication is the default, and is often referred to as integrated
security because this SQL Server security model is tightly integrated with
Windows. Specific Windows user and group accounts are trusted to log in to
SQL Server.
Windows authentication wherever possible. Windows authentication uses a
series of encrypted messages to authenticate users in SQL Server.
Server=./SQL05;Database=AuditDB;Integrated Security=true
Windows authentication is usually the best choice in the following situations:
 There is a domain controller.
 The application and the database are on the same computer.
http://sunitkanyan.blogspot.in/2015/04/window-authentication-login-user-
in-sql.html
sunit@sunitkanyan.in 8
Mixed Mode Authentication
User credentials are maintained within SQL Server.
Server=.SQL05;Database=AuditDB;User Id=Sunit;
Password=Sunit;
SQL Server logins are often used in the following situations:
 If you have a workgroup.
 Users connect from different, non-trusted domains.
 Internet applications
sunit@sunitkanyan.in 9
Mixed Mode Authentication
sunit@sunitkanyan.in 10
Mixed Mode Authentication
sunit@sunitkanyan.in 11
Authorization
The Process/function of specifying access rights to a user related to
database objects/server objects.
 Privileges
 Role
sunit@sunitkanyan.in 12
Securing
Data Security
 Validate each input from user.
 Encrypt the crucial business logic.
 Encrypt data up to extent possible
 Provide Least privilege to users
 Never use sa account to interact application with database server.
sunit@sunitkanyan.in 13
Securing
Data Security
 Validate each input from user - SQL Injection prevention.
http://sunitkanyan.blogspot.in/2015/04/sql-injection-and-defense.html
 Encrypt the crucial business logic – Sometime situation may arise to
place cipher text logic , or crucial business logic for application within
SQL server function/sp. So User Stored procedure with encrypt
 Encrypt data up to extent possible – encrypt data so that even a
administrator can not able to understand .helps to protect data from
theft.
 Provide Least privilege to users
 Never use sa account to interact application with database server.
sunit@sunitkanyan.in 14
Securing
Server Attack
 Change Default Port.
 Hiding SQL Server Instance.
 Don’t Show name of database to un-authorized user.
 Always sync security update from Microsoft for SQL sever.
 Maintain policy within SQL Server database / design own policy
to secure .
 Never use sa account to interact application with database server
sunit@sunitkanyan.in 15
Change Default Port
1) Open SSCM (SQL Server Configuration Manager)
2) Follow the SQL Native Client Configuration
3) Left hand panel will show TCP/IP
4) Go for properties
5)
sunit@sunitkanyan.in 16
Change Default Port
1) Open SSCM
2) Follow the SQL Native Client Configuration
3) Left hand panel will show TCP/IP
4) Go for properties & change default port.
sunit@sunitkanyan.in 17
Hiding Instance of SQL Server Database Engine.
1) Open SSCM (SQL Server Configuration Manager)
2) Follow the SQL Server Network Configuration
3) Select a SQL Server Instance
4) Go for properties
sunit@sunitkanyan.in 18
Hiding Instance of SQL Server Database Engine.
1) Open SSCM (SQL Server Configuration Manager)
2) Follow the SQL Server Network Configuration
3) Select a SQL Server Instance
4) Go for properties & Change flag for HideInstance
sunit@sunitkanyan.in 19
Don’t Show name of database to un-authorized user.
Provide view database permission for specific database to specific database.
sunit@sunitkanyan.in 20
Do & Don’t
Do
 Install only required components.
 Disable unnecessary features and
services.
 Install recent fixes & service packs
from Microsoft.
 Enforce strong password policy,
 Disable SA account or rename it.
 Change default port
 Hide instances
 Valid every input.
 Don’t use dynamic queries.
Don’t
 Don’t Install sample database on
Production server.
 Never Use SA account to interact
application to database
 Don’t remove the system databases/
system stored procedure.
 Don’t use dictionary passwords.
 Don’t treat input safe be valid all.
 Don’t disable automatic updated for
SQL server on production.
 Don’t take manual backup also
schedule things using scripts/
management plans
sunit@sunitkanyan.in 21
If you have any query , Please drop
email Sunit@SunitKanyan.in
sunit@sunitkanyan.in 22
Thanks!
Sunit Kanyan
www.sunitkanyan.in

More Related Content

What's hot

ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
Randy Connolly
 
Assessing security of your Active Directory
Assessing security of your Active DirectoryAssessing security of your Active Directory
Assessing security of your Active Directory
Aldo Elam Majiah
 
Microsoft asp.net identity security
Microsoft asp.net identity  securityMicrosoft asp.net identity  security
Microsoft asp.net identity securityrustd
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Tom Kerkhove
 
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSOColabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
Peter Selch Dahl
 
Spring Security
Spring SecuritySpring Security
Spring Security
Manish Sharma
 
Authentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVCAuthentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVC
Mindfire Solutions
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
Peter Selch Dahl
 
Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1
Vinu Gunasekaran
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
ILANTUS Technologies
 
Access Security - Hybrid Identity
Access Security - Hybrid IdentityAccess Security - Hybrid Identity
Access Security - Hybrid Identity
Eng Teong Cheah
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
Marwa Ahmad
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
dotnetcode
 
Mobile Authentication for iOS Applications - Stormpath 101
Mobile Authentication for iOS Applications - Stormpath 101Mobile Authentication for iOS Applications - Stormpath 101
Mobile Authentication for iOS Applications - Stormpath 101
Stormpath
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityNon Intanon
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
Shivanand Arur
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host Security
Eng Teong Cheah
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
NCCOMMS
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
Stormpath
 
Programming with Azure Active Directory
Programming with Azure Active DirectoryProgramming with Azure Active Directory
Programming with Azure Active Directory
Joonas Westlin
 

What's hot (20)

ASP.NET 13 - Security
ASP.NET 13 - SecurityASP.NET 13 - Security
ASP.NET 13 - Security
 
Assessing security of your Active Directory
Assessing security of your Active DirectoryAssessing security of your Active Directory
Assessing security of your Active Directory
 
Microsoft asp.net identity security
Microsoft asp.net identity  securityMicrosoft asp.net identity  security
Microsoft asp.net identity security
 
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultITProceed 2015 - Securing Sensitive Data with Azure Key Vault
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
 
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSOColabora.dk - Azure PTA vs ADFS vs Desktop SSO
Colabora.dk - Azure PTA vs ADFS vs Desktop SSO
 
Spring Security
Spring SecuritySpring Security
Spring Security
 
Authentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVCAuthentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVC
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
Access Security - Hybrid Identity
Access Security - Hybrid IdentityAccess Security - Hybrid Identity
Access Security - Hybrid Identity
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
 
Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
 
Mobile Authentication for iOS Applications - Stormpath 101
Mobile Authentication for iOS Applications - Stormpath 101Mobile Authentication for iOS Applications - Stormpath 101
Mobile Authentication for iOS Applications - Stormpath 101
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
 
Compute Security - Host Security
Compute Security - Host SecurityCompute Security - Host Security
Compute Security - Host Security
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
 
Programming with Azure Active Directory
Programming with Azure Active DirectoryProgramming with Azure Active Directory
Programming with Azure Active Directory
 

Viewers also liked

SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
Denny Lee
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
APT
APTAPT
Transparent Data Encryption
Transparent Data EncryptionTransparent Data Encryption
Transparent Data Encryption
John Magnabosco
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
Global Micro Solutions
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
Vladyslav Radetsky
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Risk management in supply chain
Risk management in supply chain Risk management in supply chain
Risk management in supply chain
Indo German Training Centre mumbai
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
Anand Subramaniam
 

Viewers also liked (10)

SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
 
APT
APTAPT
APT
 
Transparent Data Encryption
Transparent Data EncryptionTransparent Data Encryption
Transparent Data Encryption
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Risk management in supply chain
Risk management in supply chain Risk management in supply chain
Risk management in supply chain
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 

Similar to SQL Server Security

SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheCloudsKoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
Tobias Koprowski
 
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheCloudsKoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
Tobias Koprowski
 
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 201510 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
Scott Sutherland
 
Locking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite serverLocking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite server
Hitachi ID Systems, Inc.
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...SpanishPASSVC
 
Advance java session 19
Advance java session 19Advance java session 19
Advance java session 19
Smita B Kumar
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
SamsonMuoki
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
ThreatReel Podcast
 
MySQL Administration and Monitoring
MySQL Administration and MonitoringMySQL Administration and Monitoring
MySQL Administration and MonitoringMark Leith
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Luca Bongiorni
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
Hostway|HOSTING
 
Sql security
Sql securitySql security
Sql security
Safwan Hashmi
 
SqlSa94
SqlSa94SqlSa94
SqlSa94
Gabriel Villa
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
Hitachi ID Systems, Inc.
 
Row level security in enterprise applications
Row level security in enterprise applicationsRow level security in enterprise applications
Row level security in enterprise applications
Alexander Tokarev
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
 
Bh Win 03 Rileybollefer
Bh Win 03 RileybolleferBh Win 03 Rileybollefer
Bh Win 03 Rileybollefer
Timothy Bollefer
 

Similar to SQL Server Security (20)

SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheCloudsKoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
 
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheCloudsKoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
 
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 201510 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
 
Locking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite serverLocking down a Hitachi ID Management Suite server
Locking down a Hitachi ID Management Suite server
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
 
Advance java session 19
Advance java session 19Advance java session 19
Advance java session 19
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
 
MySQL Administration and Monitoring
MySQL Administration and MonitoringMySQL Administration and Monitoring
MySQL Administration and Monitoring
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Nii sample pt_report
Nii sample pt_reportNii sample pt_report
Nii sample pt_report
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
 
Sql security
Sql securitySql security
Sql security
 
SqlSa94
SqlSa94SqlSa94
SqlSa94
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Row level security in enterprise applications
Row level security in enterprise applicationsRow level security in enterprise applications
Row level security in enterprise applications
 
Sql server security in an insecure world
Sql server security in an insecure worldSql server security in an insecure world
Sql server security in an insecure world
 
Bh Win 03 Rileybollefer
Bh Win 03 RileybolleferBh Win 03 Rileybollefer
Bh Win 03 Rileybollefer
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

SQL Server Security

  • 2. sunit@sunitkanyan.in 2 Contents  SQL Server  Why security?  SQL Server Security  Authentication  Authorization  Securing.  Do & Don’t.
  • 4. sunit@sunitkanyan.in 4 Why Security?  Server Attack  Port Scanning  Instance Name Browsing  Exposing Database Names  Accessing administrative objects  Data threats  Data theft.  Business logic theft.  Database object change/drop.
  • 5. sunit@sunitkanyan.in 5 SQL Server Security Authentication Authorization
  • 6. sunit@sunitkanyan.in 6 Authentication The process of verifying that user/person claiming is genuine or not SQL Server supports two authentication modes.  Windows authentication mode  Mixed mode.
  • 7. sunit@sunitkanyan.in 7 Window Authentication Mode Windows authentication is the default, and is often referred to as integrated security because this SQL Server security model is tightly integrated with Windows. Specific Windows user and group accounts are trusted to log in to SQL Server. Windows authentication wherever possible. Windows authentication uses a series of encrypted messages to authenticate users in SQL Server. Server=./SQL05;Database=AuditDB;Integrated Security=true Windows authentication is usually the best choice in the following situations:  There is a domain controller.  The application and the database are on the same computer. http://sunitkanyan.blogspot.in/2015/04/window-authentication-login-user- in-sql.html
  • 8. sunit@sunitkanyan.in 8 Mixed Mode Authentication User credentials are maintained within SQL Server. Server=.SQL05;Database=AuditDB;User Id=Sunit; Password=Sunit; SQL Server logins are often used in the following situations:  If you have a workgroup.  Users connect from different, non-trusted domains.  Internet applications
  • 11. sunit@sunitkanyan.in 11 Authorization The Process/function of specifying access rights to a user related to database objects/server objects.  Privileges  Role
  • 12. sunit@sunitkanyan.in 12 Securing Data Security  Validate each input from user.  Encrypt the crucial business logic.  Encrypt data up to extent possible  Provide Least privilege to users  Never use sa account to interact application with database server.
  • 13. sunit@sunitkanyan.in 13 Securing Data Security  Validate each input from user - SQL Injection prevention. http://sunitkanyan.blogspot.in/2015/04/sql-injection-and-defense.html  Encrypt the crucial business logic – Sometime situation may arise to place cipher text logic , or crucial business logic for application within SQL server function/sp. So User Stored procedure with encrypt  Encrypt data up to extent possible – encrypt data so that even a administrator can not able to understand .helps to protect data from theft.  Provide Least privilege to users  Never use sa account to interact application with database server.
  • 14. sunit@sunitkanyan.in 14 Securing Server Attack  Change Default Port.  Hiding SQL Server Instance.  Don’t Show name of database to un-authorized user.  Always sync security update from Microsoft for SQL sever.  Maintain policy within SQL Server database / design own policy to secure .  Never use sa account to interact application with database server
  • 15. sunit@sunitkanyan.in 15 Change Default Port 1) Open SSCM (SQL Server Configuration Manager) 2) Follow the SQL Native Client Configuration 3) Left hand panel will show TCP/IP 4) Go for properties 5)
  • 16. sunit@sunitkanyan.in 16 Change Default Port 1) Open SSCM 2) Follow the SQL Native Client Configuration 3) Left hand panel will show TCP/IP 4) Go for properties & change default port.
  • 17. sunit@sunitkanyan.in 17 Hiding Instance of SQL Server Database Engine. 1) Open SSCM (SQL Server Configuration Manager) 2) Follow the SQL Server Network Configuration 3) Select a SQL Server Instance 4) Go for properties
  • 18. sunit@sunitkanyan.in 18 Hiding Instance of SQL Server Database Engine. 1) Open SSCM (SQL Server Configuration Manager) 2) Follow the SQL Server Network Configuration 3) Select a SQL Server Instance 4) Go for properties & Change flag for HideInstance
  • 19. sunit@sunitkanyan.in 19 Don’t Show name of database to un-authorized user. Provide view database permission for specific database to specific database.
  • 20. sunit@sunitkanyan.in 20 Do & Don’t Do  Install only required components.  Disable unnecessary features and services.  Install recent fixes & service packs from Microsoft.  Enforce strong password policy,  Disable SA account or rename it.  Change default port  Hide instances  Valid every input.  Don’t use dynamic queries. Don’t  Don’t Install sample database on Production server.  Never Use SA account to interact application to database  Don’t remove the system databases/ system stored procedure.  Don’t use dictionary passwords.  Don’t treat input safe be valid all.  Don’t disable automatic updated for SQL server on production.  Don’t take manual backup also schedule things using scripts/ management plans
  • 21. sunit@sunitkanyan.in 21 If you have any query , Please drop email Sunit@SunitKanyan.in

Editor's Notes

  1. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  2. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  3. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  4. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  5. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  6. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  7. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  8. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  9. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  10. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  11. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  12. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  13. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  14. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  15. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  16. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  17. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur
  18. Server attach may lead to denial of Service attach Port Scanning :- Change default port of database server Instance Name Browsing : does not allow browser server’s instance name over network Exposing Database Names : implement proper security over login /server , don’t display databases name to a user on which user does hv access. Accessing Administrative Objects Data threats >> data loss may occur