SlideShare a Scribd company logo
Securing your SQL Server
Installation
Charley Hanania, QS2 AG
B.Sc (Computing), MCP, MCDBA, MCITP, MCTS, MCT, Microsoft MVP: SQL Server
Senior Database Specialist
My Background
• Now:
– Microsoft MVP: SQL Server
– Database Consultant (again, and very happy) at QS2 AG
• Formerly:
– Production Product Owner of MS SQL Server Platform at UBS Investment Bank
• ITIL v3 Certified
• SQL Server Certified since 1988
– On SQL Server since 1995
– Version 4 on OS/2
• IT Professional since 1992
• PASS
– Chapter Leader – Switzerland
– Regional Mentor – Europe
– European PASS Conference Lead
– Event Speaker
– Database Days Conference Switzerland
Contact Info
• Email: Charley.Hanania@sqlpass.org
• Website: http://www.sqlpass.ch
• Twitter: http://www.twitter.com/CharleyHanania
• Blog: http://blogs.mssqltips.com/blogs/charleyhanania
• Linked-in: http://www.linkedin.com/in/charleyhanania
Session Outline
• General areas of focus dealing with Security
• Windows & SQL Server – “Secure By Default”
• 80 :: 20 – Simple items that make big difference
• How Much Security is Enough?
• Practices to Consider
General Areas
• Areas Generally looked at when speaking about security
– Physical Access
– Network
– Application
– Operating System
– DBMS
– Intellectual Property (IP)
– Data Privacy (Customer Data Usage)
– Segregation of duties
• Privileged access
• Privileged information
Windows Server – “Secure By Default”
• Since Windows 2008, Microsoft focussed on the
idea of Secure by Default.
• When Windows is installed
– Only the Roles and Features needed are installed
– Only essential connections are enabled
– Password Policies are more explicit
SQL Server – “Secure By Default”
• Since SQL Server 2005, Microsoft focussed on
the idea of Secure by Default.
• When SQL Server is installed
– Only the features needed to run are enabled
– Only essential connections are configured
– Connection Methodologies are also influenced.
Scopes of Protection
Windows Server
SQL Server Instance
SQL Server Instance
SQL Server Instance
SQL Server System
Databases
SQL Server User
Databases
Schemas
Objects
Schemas
Objects
Accounts
Groups
Rights
Permissions
Roles
EndpointsLogins
Roles
Users Roles
Users
Permissions Permissions
DEMO
• Obfuscation
• Change the RDP Port
• Rename the Windows Administrator Account
• Use Non-Default Instance / Port
• Rename the SA Account
{
DEMO
Obfuscation :: Changing the RDP Port
Windows Disables RDP by default.
Enabling requires firewall port opening too…
Windows Firewall
Enabling RDP App (& Port)
- Open Regedt32
- Search For “PortNumber”
- Change the port number
- Create a new firewall rule for the new Port
- Reboot
Use RDP with “<Server>:<PortNumber>”
DEMO
• Obfuscation
• Change the RDP Port
• Rename the Windows Administrator Account
• Use Non-Default Instance / Port
• Rename the SA Account
{
DEMO
Obfuscation :: Rename Win Admin Account
Open Computer Management
 Local Users and Groups
 Users
Rename the Account
Open Properties
Change the Account Details
DEMO
• Obfuscation
• Change the RDP Port
• Rename the Windows Administrator Account
• Use Non-Default Instance / Port
• Rename the SA Account
{
DEMO
Obfuscation :: Changing Instance & Port
During SQL Server Install
 Select an instance instead of default
Named Instance…
Network Protocols…
This Stops SQL Browser from Broadcasting the
Instance Name
Network Port for TCP/IP…
Change the Port (review free ports first!)
Effects ::
- No (local) Instance
- Instance Listens on New Port
DEMO
• Obfuscation
• Change the RDP Port
• Rename the Windows Administrator Account
• Use Non-Default Instance / Port
• Rename the SA Account
{
DEMO
Obfuscation :: Rename SA Account
Basically, we change the login label (external)
Rename the Account
Additionally – Strong Passwords
• Renaming Accounts is a great 1st step
• Disable the account from being useable for
login.
– Enable when needed…
• Additionally, you should ensure the password
is VERY strong.
– Why? Because shorter/simple passwords are
cracked easily
• Ref: Electrical Alchemy Information Security
– See http://www.goodpassword.com/
How Much Security is Enough?
1. Estimate value of data and objects
– Intellectual Property
– Customer Data
– Marketing/Sales plans
– Cost to redevelop
– Corporate image
– Compliance
2. Estimate risk of being compromised
3. Estimate cost of implementation
4. Estimate cost of on-going operations
How Much Security is Enough?
1. Estimate value of data and objects
2. Estimate risk of being compromised
– Closed System vs External Facing
– High Street Brand vs Bunkered Back
Operations
– New Hair Growth vs Lemon Stand Formula
– China / Russia vs Switzerland
3. Estimate cost of implementation
4. Estimate cost of ongoing operations
How Much Security is Enough?
1. Estimate value of data and objects
2. Estimate risk of being compromised
3. Estimate cost of implementation
– Layered Security Expert Team at the NSA
(Personnel)
– Mixed Hardware / Software Implementation
(Complexity)
– Existing vs Customised Solutions (Expense)
– Three Month vs Three Year Fulfillment (Time)
4. Estimate cost of ongoing operations
How Much Security is Enough?
1. Estimate value of data and objects
2. Estimate risk of being compromised
3. Estimate cost of implementation
4. Estimate cost of ongoing operations
– Fail-safes vs Recoverability
– Secure Backup (on and off-site)
– Personnel needed for maintenance and
sustainability
– Troubleshooting issues
– Performance Tuning
Practices to Consider
• Physical Security
– Limiting access to the machine itself, backups, and copies of data
– Encryption of data files and backups – Transparent Data Encryption
• Authentication
– Logins – Windows Authentication, SQL Server Authentication
• Strong passwords, password expiration policies
– Endpoints – restrict connections by protocol, login, etc.
– Encryption – More needed than just to get in.
• Authorization
– Separation of duties
• Permissions, users, roles, access through SPs or views only
– No direct access to tables
– No permissions directly to users; grant to roles and put users in roles
– Separation of data
• Instances, databases, schemas, views – or perhaps encrypt it with certificates or keys
– Principle of least privilege
• from service accounts to users and execution contexts
• Auditing
– tracking who did what when – Built into SQL Server 2008
Summary
• Security is an Operational Consideration
• Data Security is a cornerstone of Security Operations
• SQL Server and Windows employ various techniques to
secure the database environment
• Obfuscation is Step One
• How much Security?
– It Depends!
Links and Resources
• SQL Server Security Team Blog
• http://blogs.msdn.com/sqlsecurity
• Microsoft Patterns and Practices
• http://msdn.microsoft.com/en-gb/practices/default.aspx
• SQL Server Security Website
• http://www.sqlsecurity.com
• Security Best Practices - Operational and Administrative Tasks.
• http://sqlcat.com/whitepapers/archive/2007/12/16/sql-server-2005-security-best-practices-operational-
and-administrative-tasks.aspx
• SQL Server Security Forum
• http://social.msdn.microsoft.com/forums/en-US/sqlsecurity/threads
• How to Change the RDP Port
• http://support.microsoft.com/kb/306759
Sql tune in 2012 - securing your sql server - charley hanania - 2012-09-25 - zagreb croatia
Sql tune in 2012 - securing your sql server - charley hanania - 2012-09-25 - zagreb croatia
Sql tune in 2012 - securing your sql server - charley hanania - 2012-09-25 - zagreb croatia

More Related Content

More from Charley Hanania

2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx
2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx
2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptxCharley Hanania
 
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...Charley Hanania
 
SQL Server Club - SQL Server Enterprise Consolidation - charley hanania
SQL Server Club - SQL Server Enterprise Consolidation - charley hananiaSQL Server Club - SQL Server Enterprise Consolidation - charley hanania
SQL Server Club - SQL Server Enterprise Consolidation - charley hananiaCharley Hanania
 
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...Charley Hanania
 
Tech days 2011 - database design patterns for keeping your database applicati...
Tech days 2011 - database design patterns for keeping your database applicati...Tech days 2011 - database design patterns for keeping your database applicati...
Tech days 2011 - database design patterns for keeping your database applicati...Charley Hanania
 
Designing and developing your database for application availability
Designing and developing your database for application availabilityDesigning and developing your database for application availability
Designing and developing your database for application availabilityCharley Hanania
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...Charley Hanania
 
Pass chapter meeting - november - partitioning for database availability - ch...
Pass chapter meeting - november - partitioning for database availability - ch...Pass chapter meeting - november - partitioning for database availability - ch...
Pass chapter meeting - november - partitioning for database availability - ch...Charley Hanania
 
Swiss pass chapter deck lausanne - june 2011
Swiss pass chapter deck   lausanne - june 2011Swiss pass chapter deck   lausanne - june 2011
Swiss pass chapter deck lausanne - june 2011Charley Hanania
 
Swiss pass chapter deck - zurich - april 2011
Swiss pass chapter deck - zurich - april 2011Swiss pass chapter deck - zurich - april 2011
Swiss pass chapter deck - zurich - april 2011Charley Hanania
 
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck Dives
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck DivesPass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck Dives
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck DivesCharley Hanania
 
Sql server operational best practices notes from the field - charley hanan...
Sql server operational best practices    notes from the field - charley hanan...Sql server operational best practices    notes from the field - charley hanan...
Sql server operational best practices notes from the field - charley hanan...Charley Hanania
 
Sql server club - performance management methodologies and enhancements in sq...
Sql server club - performance management methodologies and enhancements in sq...Sql server club - performance management methodologies and enhancements in sq...
Sql server club - performance management methodologies and enhancements in sq...Charley Hanania
 
Sql connections germany - migration considerations when migrating your on pre...
Sql connections germany - migration considerations when migrating your on pre...Sql connections germany - migration considerations when migrating your on pre...
Sql connections germany - migration considerations when migrating your on pre...Charley Hanania
 

More from Charley Hanania (14)

2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx
2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx
2024.03.01 - My weakness, Your Glory - Contemplations on Jonah.pptx
 
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...
SQLBits 2008 - SQL Server High Availability and Disaster Recovery Overview - ...
 
SQL Server Club - SQL Server Enterprise Consolidation - charley hanania
SQL Server Club - SQL Server Enterprise Consolidation - charley hananiaSQL Server Club - SQL Server Enterprise Consolidation - charley hanania
SQL Server Club - SQL Server Enterprise Consolidation - charley hanania
 
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...
Pass chapter meeting dec 2013 - compression a hidden gem for io heavy databas...
 
Tech days 2011 - database design patterns for keeping your database applicati...
Tech days 2011 - database design patterns for keeping your database applicati...Tech days 2011 - database design patterns for keeping your database applicati...
Tech days 2011 - database design patterns for keeping your database applicati...
 
Designing and developing your database for application availability
Designing and developing your database for application availabilityDesigning and developing your database for application availability
Designing and developing your database for application availability
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 
Pass chapter meeting - november - partitioning for database availability - ch...
Pass chapter meeting - november - partitioning for database availability - ch...Pass chapter meeting - november - partitioning for database availability - ch...
Pass chapter meeting - november - partitioning for database availability - ch...
 
Swiss pass chapter deck lausanne - june 2011
Swiss pass chapter deck   lausanne - june 2011Swiss pass chapter deck   lausanne - june 2011
Swiss pass chapter deck lausanne - june 2011
 
Swiss pass chapter deck - zurich - april 2011
Swiss pass chapter deck - zurich - april 2011Swiss pass chapter deck - zurich - april 2011
Swiss pass chapter deck - zurich - april 2011
 
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck Dives
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck DivesPass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck Dives
Pass camp 2010 - DBA 101 to 401 - From Spring Board to Deep Wreck Dives
 
Sql server operational best practices notes from the field - charley hanan...
Sql server operational best practices    notes from the field - charley hanan...Sql server operational best practices    notes from the field - charley hanan...
Sql server operational best practices notes from the field - charley hanan...
 
Sql server club - performance management methodologies and enhancements in sq...
Sql server club - performance management methodologies and enhancements in sq...Sql server club - performance management methodologies and enhancements in sq...
Sql server club - performance management methodologies and enhancements in sq...
 
Sql connections germany - migration considerations when migrating your on pre...
Sql connections germany - migration considerations when migrating your on pre...Sql connections germany - migration considerations when migrating your on pre...
Sql connections germany - migration considerations when migrating your on pre...
 

Recently uploaded

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 

Recently uploaded (20)

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Sql tune in 2012 - securing your sql server - charley hanania - 2012-09-25 - zagreb croatia

  • 1. Securing your SQL Server Installation Charley Hanania, QS2 AG B.Sc (Computing), MCP, MCDBA, MCITP, MCTS, MCT, Microsoft MVP: SQL Server Senior Database Specialist
  • 2.
  • 3. My Background • Now: – Microsoft MVP: SQL Server – Database Consultant (again, and very happy) at QS2 AG • Formerly: – Production Product Owner of MS SQL Server Platform at UBS Investment Bank • ITIL v3 Certified • SQL Server Certified since 1988 – On SQL Server since 1995 – Version 4 on OS/2 • IT Professional since 1992 • PASS – Chapter Leader – Switzerland – Regional Mentor – Europe – European PASS Conference Lead – Event Speaker – Database Days Conference Switzerland
  • 4. Contact Info • Email: Charley.Hanania@sqlpass.org • Website: http://www.sqlpass.ch • Twitter: http://www.twitter.com/CharleyHanania • Blog: http://blogs.mssqltips.com/blogs/charleyhanania • Linked-in: http://www.linkedin.com/in/charleyhanania
  • 5. Session Outline • General areas of focus dealing with Security • Windows & SQL Server – “Secure By Default” • 80 :: 20 – Simple items that make big difference • How Much Security is Enough? • Practices to Consider
  • 6. General Areas • Areas Generally looked at when speaking about security – Physical Access – Network – Application – Operating System – DBMS – Intellectual Property (IP) – Data Privacy (Customer Data Usage) – Segregation of duties • Privileged access • Privileged information
  • 7. Windows Server – “Secure By Default” • Since Windows 2008, Microsoft focussed on the idea of Secure by Default. • When Windows is installed – Only the Roles and Features needed are installed – Only essential connections are enabled – Password Policies are more explicit
  • 8. SQL Server – “Secure By Default” • Since SQL Server 2005, Microsoft focussed on the idea of Secure by Default. • When SQL Server is installed – Only the features needed to run are enabled – Only essential connections are configured – Connection Methodologies are also influenced.
  • 9. Scopes of Protection Windows Server SQL Server Instance SQL Server Instance SQL Server Instance SQL Server System Databases SQL Server User Databases Schemas Objects Schemas Objects Accounts Groups Rights Permissions Roles EndpointsLogins Roles Users Roles Users Permissions Permissions
  • 10. DEMO • Obfuscation • Change the RDP Port • Rename the Windows Administrator Account • Use Non-Default Instance / Port • Rename the SA Account
  • 12. Windows Disables RDP by default. Enabling requires firewall port opening too…
  • 14. Enabling RDP App (& Port)
  • 15. - Open Regedt32 - Search For “PortNumber”
  • 16. - Change the port number - Create a new firewall rule for the new Port - Reboot
  • 17. Use RDP with “<Server>:<PortNumber>”
  • 18.
  • 19. DEMO • Obfuscation • Change the RDP Port • Rename the Windows Administrator Account • Use Non-Default Instance / Port • Rename the SA Account
  • 20. { DEMO Obfuscation :: Rename Win Admin Account
  • 21. Open Computer Management  Local Users and Groups  Users
  • 23. Open Properties Change the Account Details
  • 24.
  • 25. DEMO • Obfuscation • Change the RDP Port • Rename the Windows Administrator Account • Use Non-Default Instance / Port • Rename the SA Account
  • 27. During SQL Server Install  Select an instance instead of default
  • 30. This Stops SQL Browser from Broadcasting the Instance Name
  • 31. Network Port for TCP/IP…
  • 32. Change the Port (review free ports first!)
  • 33. Effects :: - No (local) Instance - Instance Listens on New Port
  • 34.
  • 35. DEMO • Obfuscation • Change the RDP Port • Rename the Windows Administrator Account • Use Non-Default Instance / Port • Rename the SA Account
  • 37. Basically, we change the login label (external)
  • 39.
  • 40. Additionally – Strong Passwords • Renaming Accounts is a great 1st step • Disable the account from being useable for login. – Enable when needed… • Additionally, you should ensure the password is VERY strong. – Why? Because shorter/simple passwords are cracked easily • Ref: Electrical Alchemy Information Security – See http://www.goodpassword.com/
  • 41. How Much Security is Enough? 1. Estimate value of data and objects – Intellectual Property – Customer Data – Marketing/Sales plans – Cost to redevelop – Corporate image – Compliance 2. Estimate risk of being compromised 3. Estimate cost of implementation 4. Estimate cost of on-going operations
  • 42. How Much Security is Enough? 1. Estimate value of data and objects 2. Estimate risk of being compromised – Closed System vs External Facing – High Street Brand vs Bunkered Back Operations – New Hair Growth vs Lemon Stand Formula – China / Russia vs Switzerland 3. Estimate cost of implementation 4. Estimate cost of ongoing operations
  • 43. How Much Security is Enough? 1. Estimate value of data and objects 2. Estimate risk of being compromised 3. Estimate cost of implementation – Layered Security Expert Team at the NSA (Personnel) – Mixed Hardware / Software Implementation (Complexity) – Existing vs Customised Solutions (Expense) – Three Month vs Three Year Fulfillment (Time) 4. Estimate cost of ongoing operations
  • 44. How Much Security is Enough? 1. Estimate value of data and objects 2. Estimate risk of being compromised 3. Estimate cost of implementation 4. Estimate cost of ongoing operations – Fail-safes vs Recoverability – Secure Backup (on and off-site) – Personnel needed for maintenance and sustainability – Troubleshooting issues – Performance Tuning
  • 45. Practices to Consider • Physical Security – Limiting access to the machine itself, backups, and copies of data – Encryption of data files and backups – Transparent Data Encryption • Authentication – Logins – Windows Authentication, SQL Server Authentication • Strong passwords, password expiration policies – Endpoints – restrict connections by protocol, login, etc. – Encryption – More needed than just to get in. • Authorization – Separation of duties • Permissions, users, roles, access through SPs or views only – No direct access to tables – No permissions directly to users; grant to roles and put users in roles – Separation of data • Instances, databases, schemas, views – or perhaps encrypt it with certificates or keys – Principle of least privilege • from service accounts to users and execution contexts • Auditing – tracking who did what when – Built into SQL Server 2008
  • 46. Summary • Security is an Operational Consideration • Data Security is a cornerstone of Security Operations • SQL Server and Windows employ various techniques to secure the database environment • Obfuscation is Step One • How much Security? – It Depends!
  • 47. Links and Resources • SQL Server Security Team Blog • http://blogs.msdn.com/sqlsecurity • Microsoft Patterns and Practices • http://msdn.microsoft.com/en-gb/practices/default.aspx • SQL Server Security Website • http://www.sqlsecurity.com • Security Best Practices - Operational and Administrative Tasks. • http://sqlcat.com/whitepapers/archive/2007/12/16/sql-server-2005-security-best-practices-operational- and-administrative-tasks.aspx • SQL Server Security Forum • http://social.msdn.microsoft.com/forums/en-US/sqlsecurity/threads • How to Change the RDP Port • http://support.microsoft.com/kb/306759