11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 22: Deployment Review 677SQL Server Database ObjectsReview the following questions to ensure that you have removed unnecessarydatabase objects, including the sample databases, <strong>and</strong> that stored procedures areappropriately secured.● Have you removed sample databases?Use SQL Server Enterprise Manager to check that all sample databases, includingPubs <strong>and</strong> Northwind, have been removed.● Have you secured stored procedures?Check to make sure that neither the public role nor the guest user has access toany of your stored procedures. To authorize access to stored procedures, youshould map the SQL Server login of your server to a database user, place thedatabase user in a user-defined database role, <strong>and</strong> then apply permissions to thisrole to provide execute access to the stored procedures of your application.●Have you restricted access to cmdExec?The cmdExec function is used by the SQL Server Agent to execute Windowscomm<strong>and</strong>-line applications <strong>and</strong> scripts that are scheduled by the SQL ServerAgent. Check that access to cmdExec is restricted to members of the sysadminrole.To check this, use SQL Server Enterprise Manager to exp<strong>and</strong> the Managementnode. Right-click SQL Server Agent <strong>and</strong> display the SQL Server Agent Propertiesdialog box. Click the Job System tab <strong>and</strong> check that Only users with SysAdminprivileges can execute CmdExec <strong>and</strong> ActiveScripting job steps is selected.Network ConfigurationThe goal for this phase of the review is to identify vulnerabilities in the configurationof your network. For further background information about the issues raised by thereview questions in this section, see Chapter 15, “Securing Your Network.”To help focus <strong>and</strong> structure the review process, the review questions have beendivided into the following configuration categories:● Router● Firewall● Switch

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!