Solved

how do you secure or review a SQL 2000 or SQL 2008 Database.

Posted on 2014-09-29
4
119 Views
Last Modified: 2014-10-01
Hello,

I have a Database SQL, how i'm able to know that is very secure from hackers and no one access the database.
Can I see logs? etc.. which ip etc.. please provide me info.
0
Comment
Question by:koila
  • 2
4 Comments
 
LVL 25

Assisted Solution

by:jogos
jogos earned 250 total points
ID: 40350500
First give no user more rights as he needs.  Concider to use windows authentication over an application-user with a appication login.

Be aware of sql injection
http://technet.microsoft.com/en-us/library/ms161953(v=sql.105).aspx
https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet
so limit dynamic sql
http://blogs.msdn.com/b/raulga/archive/2007/01/04/dynamic-sql-sql-injection.aspx
0
 
LVL 4

Author Comment

by:koila
ID: 40350515
how i'm able to view these logs file? to who access the database?
0
 
LVL 25

Expert Comment

by:jogos
ID: 40350561
0
 
LVL 46

Accepted Solution

by:
Vitor Montalvão earned 250 total points
ID: 40351649
Set the instance for Windows Authentication only.
Use domain accounts for SQL Server service and SQL Server Agent service.
Deny execution on xp_cmdshell.
Give no one privileges  to access the machine, only DBA's.
Grant low privileges for user databases and no permissions to system databases (once more, only DBA's).
If data are classified think in put the SQL Server behind a firewall. Apply the most recent security hotfixes and keep it up to date.
Activate Login Audit.
Perform backups constantly.
0

Featured Post

New My Cloud Pro Series - organize everything!

With space to keep virtually everything, the My Cloud Pro Series offers your team the network storage to edit, save and share production files from anywhere with an internet connection. Compatible with both Mac and PC, you're able to protect your content regardless of OS.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This article shows gives you an overview on SQL Server 2016 row level security. You will also get to know the usages of row-level-security and how it works
Via a live example combined with referencing Books Online, show some of the information that can be extracted from the Catalog Views in SQL Server.
Via a live example, show how to setup several different housekeeping processes for a SQL Server.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now