11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Checklist: Securing Your Database Server 731Files <strong>and</strong> DirectoriesCheck DescriptionRestrictive permissions are configured on SQL Server installation directories (per the guide).The Everyone group does not have permission to access SQL Server installation directories.Setup log files are secured.Tools, utilities, <strong>and</strong> SDKs are removed or secured.Sensitive data files are encrypted using EFS (This is an optional step. If implemented, useEFS only to encrypt MDF files, not LDF log files).SharesCheck DescriptionAll unnecessary shares are removed from the server.Access to required shares is restricted (the Everyone group doesn’t have access).Administrative shares (C$ <strong>and</strong> Admin$) are removed if they are not required (MicrosoftManagement Server (SMS) <strong>and</strong> Microsoft Operations Manager (MOM) require these shares).PortsCheck DescriptionRestrict access to all ports on the server except the ports configured for SQL Server <strong>and</strong>database instances (TCP 1433 <strong>and</strong> UDP 1434 by default).Named instances are configured to listen on the same port.Port 3389 is secured using IPSec if it is left open for remote Terminal ServicesadministrationThe firewall is configured to support DTC traffic (if required by the application).The Hide server option is selected in the Server Network Utility (optional).RegistryCheck DescriptionSQL Server registry keys are secured with restricted permissions.The SAM is secured (st<strong>and</strong>alone servers only).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!