1 / 25

Enhancing SQL Server Security: Common Vulnerabilities & Best Practices

Join Martin Cairney at SQL Bits on October 6, 2007, for an insightful session on SQL Server security. This presentation addresses critical security flaws in SQL Server deployments, including over-privileged access, unauthorized external access, and vulnerabilities within application and database servers. Learn about effective strategies for securing SQL Server environments, implementing proper auditing, and managing service accounts. Don't miss this opportunity to enhance your understanding of SQL Server security, network access, and permissions management.

pegeen
Télécharger la présentation

Enhancing SQL Server Security: Common Vulnerabilities & Best Practices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Platinum Learn & Enjoy [Put your phone on Vibrate!] www.sqlbits.com Group BY: [Food and Drink at Reading Bowl, see you there!] Gold Feedback Forms: [Voucher for £30 book on return of Form] Silver Lunch Time Sessions: [Idera in Everest, Quest in Memphis, Grok in Chic 1 and 2] Ask The Experts[Sessions need to finish on time, take questions to the ATE area]

  2. Is your SQL Server secure? Common Security Holes in SQL Server Deployments Martin Cairney – cairney@internode.on.net SQL Bits - 6th October 2007 Martin Cairney

  3. What are the issues?

  4. Internal users with over-privileged access Directory Server Email Server Application Server Unsecured SQL Server File Server Unauthorised external access Database Server Attack Sources External Firewall Internal Firewall Web/Windows application Browser

  5. Strategy SQL Bits - 6th October 2007 Martin Cairney

  6. Operating System Aspects SQL Bits - 6th October 2007 Martin Cairney

  7. SQL Server Aspects SQL Bits - 6th October 2007 Martin Cairney

  8. Service Accounts SQL Bits - 6th October 2007 Martin Cairney

  9. Security Groups SQL Bits - 6th October 2007 Martin Cairney

  10. Registry ACLs SQL Bits - 6th October 2007 Martin Cairney

  11. File/Directory ACLs SQL Bits - 6th October 2007 Martin Cairney

  12. Auditing SQL Bits - 6th October 2007 Martin Cairney

  13. Network Access SQL Bits - 6th October 2007 Martin Cairney

  14. Installed Features SQL Bits - 6th October 2007 Martin Cairney

  15. Logins SQL Bits - 6th October 2007 Martin Cairney

  16. Server Role Membership SQL Bits - 6th October 2007 Martin Cairney

  17. Database Users SQL Bits - 6th October 2007 Martin Cairney

  18. Database Role Memberships SQL Bits - 6th October 2007 Martin Cairney

  19. Database Permissions SQL Bits - 6th October 2007 Martin Cairney

  20. Auditing SQL Bits - 6th October 2007 Martin Cairney

  21. SQL 2005 Improvements SQL Bits - 6th October 2007 Martin Cairney

  22. SQL 2005 Improvements SQL Bits - 6th October 2007 Martin Cairney

  23. Security Resources SQL Bits - 6th October 2007 Martin Cairney

  24. Platinum www.SQLBits.com[Conference Web site] www.sqlbits.com www.SQLBlogCasts.com[Becoming the premier Blogging site for SQL professionals] Gold www.SQLServerFAQ.com[UK SQL Server Community Website] Silver UK SQL Bloggers cwebbbi.spaces.live.comsqlblogcasts.com/blogs/simonssqlblogcasts.com/blogs/tonyrogerson Feedback Forms!!

  25. Question Time ? Come to the ‘Ask The Experts’ area after the presentation for the chance to ask further questions. Contact me at : cairney@internode.on.net SQL Bits - 6th October 2007 Martin Cairney

More Related