11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

528 Part IV: Securing Your Network, Host <strong>and</strong> <strong>Application</strong> To configure Windows only authentication1. Start SQL Server Enterprise Manager, exp<strong>and</strong> the SQL Server Group, <strong>and</strong> thenexp<strong>and</strong> your SQL Server.2. Right-click your SQL Server, <strong>and</strong> then click Properties.3. Click the <strong>Security</strong> tab.4. Select Windows only, <strong>and</strong> then click OK.5. Restart SQL Server for the changes to take effect.Set SQL Server Audit Level to Failure or AllBy default, SQL Server login auditing is not enabled. Minimally, you should auditfailed logins.Note Log entries are written to SQL log files. By default, these are located in C:\ProgramFiles\Microsoft SQL Server\MSSQL\LOG. You can use any text reader, such as Notepad, to viewthem. To enable SQL Server auditing1. Start SQL Server Enterprise Manager, exp<strong>and</strong> the SQL Server Group, <strong>and</strong> thenexp<strong>and</strong> your SQL Server.2. Right-click your SQL Server, <strong>and</strong> then click Properties.3. Click the <strong>Security</strong> tab.4. Set the Audit level to either All or Failure.5. Restart SQL Server for the changes to audit policy to take effect.For more information about SQL Server audit logs, see the TechNet article <strong>and</strong> itssection “Underst<strong>and</strong>ing the Audit Log” in the “SQL Server 2000 Auditing” article athttp://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/prodtech/dbsql/sql2kaud.asp?frame=true.Run SQL Server Using a Least Privileged AccountRun the SQL Server service using a least privileged account to minimize the damagethat can be done by an attacker who manages to execute operating system comm<strong>and</strong>sfrom SQL Server. The SQL Server service account should not be granted elevatedprivileges such as membership to the Administrators group.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!