11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

532 Part IV: Securing Your Network, Host <strong>and</strong> <strong>Application</strong>Step 12. SQL Server Database ObjectsSQL Server provides two sample databases for development <strong>and</strong> education togetherwith a series of built-in stored procedures <strong>and</strong> extended stored procedures. Thesample databases should not be installed on production servers <strong>and</strong> powerful storedprocedures <strong>and</strong> extended stored procedures should be secured.In this step, you:● Remove the sample databases.●●●Secure stored procedures.Secure extended stored procedures.Restrict cmdExec access to the sysadmin role.Remove the Sample DatabasesUse SQL Server Enterprise Manager to remove any sample databases. By default SQLServer includes the Pubs <strong>and</strong> Northwind sample databases.Secure Stored ProceduresRestrict access to your application’s stored procedures. Do not grant the public role orthe guest user access to any stored procedures that you create. Your main line ofdefense for securing stored procedures is to ensure that you use strongauthentication, <strong>and</strong> then to provide granular authorization, allowing only thenecessary users permission to run the stored procedures.The recommended approach is to create a SQL Server login for your application, mapthe login to a database user, add the user to a user-defined database role, <strong>and</strong> thengrant permissions to the role.Secure Extended Stored ProceduresDeleting stored procedures is not tested <strong>and</strong> not supported.Restrict cmdExec Access to the sysadmin RoleThe cmdExec function is used by the SQL Server Agent to execute Windowscomm<strong>and</strong>-line applications <strong>and</strong> scripts that are scheduled by the SQL Server Agent.Prior to SQL Server Service Pack 3, by default the SQL Server Agent allows users whoare not in the sysadmin role to schedule jobs that may require privileged access to thesystem. You should change this setting to allow members only of the sysadmin roleto schedule jobs.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!