11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 18: Securing Your Database Server 533 To restrict cmdExec access to the sysadmin role1. Start SQL Server Enterprise Manager, exp<strong>and</strong> the SQL Server Group, <strong>and</strong> thenexp<strong>and</strong> your SQL Server.2. Exp<strong>and</strong> the Management node, right-click SQL Server Agent, <strong>and</strong> then clickProperties.The SQL Server Agent Properties dialog box is displayed.3. Click the Job System tab.4. At the bottom of the dialog, select the Only users with SysAdmin privileges canexecute CmdExec <strong>and</strong> ActiveScripting job steps check box.5. Click OK.Note This change may require you to supply a user name <strong>and</strong> password. If the SQL Server serviceaccount is least privileged user (as advocated earlier in this chapter), you will be prompted for theuser name <strong>and</strong> password of an administrator account that has privileges to modify the service.Snapshot of a Secure Database ServerWhen you have a snapshot view that shows the attributes of a secured SQL Serverdatabase server, you can quickly <strong>and</strong> easily compare settings with your own server.The settings shown in Table 18.5 are based on an analysis of SQL Server databaseservers that have proven to be very resilient to attack <strong>and</strong> demonstrate soundsecurity practices.Table 18.5 Snapshot of a Secure Database ServerComponent CharacteristicsPatches <strong>and</strong> Updates Latest service packs <strong>and</strong> patches are applied for Windows 2000 <strong>and</strong> SQLServerServicesNonessential services are disabled.The MSDTC is disabled if not used.The MSSearch service is disabled if not required.The SQLServerAgent service is disabled if not required.The MSSQLServerADHelper service is disabled if not required.ProtocolsUnnecessary protocols are removed or disabled.The following protocols are not enabled on the server: NetBIOS <strong>and</strong> SMB.The TCP/IP stack is hardened.(continued)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!