Solved

how do you secure or review a SQL 2000 or SQL 2008 Database.

Posted on 2014-09-29
4
122 Views
Last Modified: 2014-10-01
Hello,

I have a Database SQL, how i'm able to know that is very secure from hackers and no one access the database.
Can I see logs? etc.. which ip etc.. please provide me info.
0
Comment
Question by:koila
  • 2
4 Comments
 
LVL 25

Assisted Solution

by:jogos
jogos earned 250 total points
ID: 40350500
First give no user more rights as he needs.  Concider to use windows authentication over an application-user with a appication login.

Be aware of sql injection
http://technet.microsoft.com/en-us/library/ms161953(v=sql.105).aspx
https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet
so limit dynamic sql
http://blogs.msdn.com/b/raulga/archive/2007/01/04/dynamic-sql-sql-injection.aspx
0
 
LVL 4

Author Comment

by:koila
ID: 40350515
how i'm able to view these logs file? to who access the database?
0
 
LVL 25

Expert Comment

by:jogos
ID: 40350561
0
 
LVL 49

Accepted Solution

by:
Vitor Montalvão earned 250 total points
ID: 40351649
Set the instance for Windows Authentication only.
Use domain accounts for SQL Server service and SQL Server Agent service.
Deny execution on xp_cmdshell.
Give no one privileges  to access the machine, only DBA's.
Grant low privileges for user databases and no permissions to system databases (once more, only DBA's).
If data are classified think in put the SQL Server behind a firewall. Apply the most recent security hotfixes and keep it up to date.
Activate Login Audit.
Perform backups constantly.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Using examples as well as descriptions, and references to Books Online, show the documentation available for date manipulation functions and by using a select few of these functions, show how date based data can be manipulated with these functions.
Via a live example, show how to setup several different housekeeping processes for a SQL Server.

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question