Solved

Mysql hardening and db security

Posted on 2012-03-30
2
541 Views
Last Modified: 2012-04-11
Guys,
I have my questions with customer with db hardening with Mysql, do anyone here have any best practices
0
Comment
Question by:motioneye
2 Comments
 
LVL 7

Assisted Solution

by:designatedinitializer
designatedinitializer earned 250 total points
ID: 37789674
1. Change mysql 'root' user password;
2. Disable remote access to mysql server;
3. Always create a db user for each db, and always grant that said user only the privileges needed on a daily basis. For instance, 99% of web applications won't be needing to ALTER, CREATE or DROP tables;
4. Use transactions;
5. Always encrypt passwords and sensitive information;
6. Use unreversible encryption (e.g. MD5) for passwords;
7. Log all errors;
8. Sanitize all input before performing your queries;
0
 
LVL 15

Accepted Solution

by:
Insoftservice earned 250 total points
ID: 37799588
Normally we do the fix in my.cnf /ini files .
please view the links
try out
mysql_secure_installation

http://www.greensql.com/articles/mysql-security-best-practices
http://security-24-7.com/hardening-guide-for-mysql-5-1-47-on-redhat-5-4-64bit-edition/
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Fore-Foreword Today (2016) Maxmind has a new approach to the distribution of its data sets.  This article may be obsolete.  Instead of using the examples here, have a look at the MaxMind API (https://www.maxmind.com/en/geolite2-developer-package). …
Introduction Since I wrote the original article about Handling Date and Time in PHP and MySQL (http://www.experts-exchange.com/articles/201/Handling-Date-and-Time-in-PHP-and-MySQL.html) several years ago, it seemed like now was a good time to updat…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question