11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

510 Part IV: Securing Your Network, Host <strong>and</strong> <strong>Application</strong>Before Running SQL Server SetupBefore you run the SQL Server setup program, check the following items:● Create a least privileged local account with which to run the SQL Server service.Use this account when you are prompted for service settings during setup. Do notuse the local system account or an administrator account.● Make sure you do not install SQL Server on a domain controller.● Make sure you install SQL Server on a partition formatted with NTFS.●Install SQL Server program <strong>and</strong> database files on a non-system volume, separatefrom the operating system.Installing SQL ServerWhen installing SQL Server on a production server, choose the custom setup option.When you do this, you can selectively choose the items to install. You should notinstall the items listed in Table 18.2 on a production database server.Table 18.2 Items Not to Install During Custom InstallationToolPurposeUpgrade tools Used to upgrade SQL Server 6.5 databasesReplication supportFull text searchBooks onlineDevelopment toolsCode samplesScript <strong>and</strong> binary files used for replication. (Do not install unless you needreplication.)Full text search engine (Microsoft Search service). Do not install unless yourequire full text search.SQL Server documentationHeaders <strong>and</strong> library files used by C developers <strong>and</strong> Microsoft Data Access(MDAC), <strong>and</strong> XML software development kits (SDKs), <strong>and</strong> an interface forstored procedure debugging.Sample code used to educate developers.Also, select Windows authentication mode unless SQL Server authentication isspecifically required. Windows authentication offers the following advantages:● Existing domain <strong>and</strong> local security policies can be used to enforce strongpasswords <strong>and</strong> account management best practices.●●Credentials are not passed over the network.<strong>Application</strong> database connection strings do not require credentials.If you select Mixed Mode, create a strong password for the sa account. The sa accountis a prime target for password guessing <strong>and</strong> dictionary attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!