Securing SQL Server
Protecting Your Database from AttackersBy
- Denny Cherry, (MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5.
Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security.
Paperback, 408 Pages
Published: August 2012
Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. Hes a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesnt work, hes speaking from experience. Active in the community, his passion is sharing. Youll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft "Securing SQL Server - Protecting Your Database from Attackers and SQL Injection Attacks and Defense are two new books out on SQL security. The first, Securing SQL Server - Protecting Your Database from Attackers, author Denny Cherry takes a high-level approach to the topic. The book explains how to secure and protect a SQL database from attack. The book details how to configure SQL against both internal and external-based attacks. This updated edition includes new chapters on analysis services, reporting services, and storage area network security. For anyone new to SQL security, Cherry does a great job of explaining what needs to be done in this valuable guide. In and SQL Injection Attacks and Defense, editor Justin Clarke enlists the help of a set of experts on how to deal with SQL injection attacks. Since SQL is so ubiquitous on corporate networks, with sites often running hundreds of SQL servers; SQL is prone to attacks. SQL injection is a technique often used to attack databases through a website and is often done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. SQL injection is a code injection technique that exploits security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. With that, the need to defend servers against such attacks is an imperative and SQL Injection Attacks and Defense should be required reading for anyone tasks with securing SQL servers."--RSA Conference
Chapter 1: Securing the Network
Chapter 2: Database EncryptionChapter 3: SQL Password Security
Chapter 4: Securing the InstanceChapter 5: Additional Security for an Internet Facing SQL Server and Application
Chapter 6: Analysis ServicesChapter 7: Reporting Services
Chapter 8: SQL Injection AttacksChapter 9: Database Backup Security Compression and Encryption
Chapter 10: Storage Area Network SecurityChapter 11: Auditing for Security
Chapter 12: Server RightsChapter 13: Securing Data
Appendix A: External Audit Checklists