11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 18: Securing Your Database Server 535Table 18.5 Snapshot of a Secure Database Server (continued)Component CharacteristicsPortsAll ports except SQL Server listening port [Default 1433] are blockedNamed instances are configured to listen on the same port.A non-st<strong>and</strong>ard SQL Server port (not TCP 1443) is used as an additional layerof defense.The hide server option is used as an additional layer of defense (optional).The firewall is configured to support DTC traffic (if necessary).A firewall is used to separate users from the SQL TCP/IP port.RegistryEveryone group is removed from SQL Server registry keys.SAM is secured (st<strong>and</strong>-alone servers only).Auditing <strong>and</strong> LoggingFailed Windows logon attempts are logged.Failed actions across the file system are logged.SQL Server SettingsSQL Server <strong>Security</strong>SQL Server login auditing is enabled.Authentication setting for SQL Server is Windows Only if possible.SQL Server audit level set to Failure or All.The SQL Server Startup Service account is a least privileged account.SQL Server Logins,Users <strong>and</strong> RolesThe sa account has a strong password.SQL Server guest accounts are removed from non-system databases.The BUILTIN\Administrators group is removed from the SQL Server logins.The sysadmin role does not contain the BUILTIN\Administrators group.Permissions are not granted for the public role.The sysadmin role contains no more than two users.Restricted (granular) database permissions are granted (Built-in, non-granularroles such as db_datareader <strong>and</strong> db_datawriter are avoided)Default permissions for SQL Server objects are not changed.SQL Server DatabaseObjectsAll sample databases are removed from the server.Stored procedures are secured.Extended stored procedures are secured.cmdExec is restricted to the sysadmin role only.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!