SlideShare a Scribd company logo
Taking Control of
Your Organization’s
SQL Server Sprawl
July 26, 2017
About Me
• Infrastructure and security architect
• Database Administrator / Architect
• Former Incident Response team lead
• Certified Information Systems Auditor (CISA)
• SQL Server security columnist / blogger
• Editor for SQL Server benchmarks at Center for Internet Security
My Contact Information
K. Brian Kelley
Email: kbriankelley@acm.org
Twitter: @kbriankelley
Infrastructure/Security Blog: http://truthsolutions.wordpress.com
Personal Development Blog: http://gkdba.wordpress.com
• Understanding the Risk
• Finding Servers
• Checking the Data
• Standards & Policy
Understanding the Risk
Risk Areas
• Data, Data, Data!
• Lateral movement by adversaries
• Licensing
Finding Servers
Servers on the Network
• SSMS drop down and sqlcmd –L
• SQL Ping and variants
• Dedicated scanners
• 3rd party dedicated scanning tools
Caution with Scanning
• May be seen as “hacking activity”
• Know exactly what you’re going to do
• Check with your security folks so they understand
• Get permission in writing (email counts as long as it gets saved)
• Make sure that permission comes from someone with authority to give it.
Hidden from the network?
• Network libraries disabled
• OS Firewall turned on
• Listening on a non-standard port
• “Crafty” start and stop of services
Finding Hidden SQL Servers
• Inventory / Configuration Management Tool
• Need Admin rights. May need Domain Admin based on default permissions.
• Understand how data is collected.
• Can’t rely on Add/Remove Programs data
• SQL Server is installed. What component?
• Exchange issue – have to query for services installed to verify it’s the server.
Checking the Data
Found the Server… What’s Next?
• At this point, it doesn’t matter if it’s authorized.
• We want to know what’s on it.
• Looking for Shadow IT.
• Looking for unprotected data.
Investigating the Data
• Look for same database names as production
• Then look for pattern matches (PayRollDB_20170701 matched by PayRollDB%)
• Use object names from production to look for matches on discovered DBs
• Then start looking at the data.
Standards & Policy
What are your organization’s standards?
• What’s permitted?
• Is it in writing?
• What are the consequences for an unauthorized SQL Server?
• Who is allowed to remediate?
• What are they allowed to do?
• Are there audit & compliance requirements you can leverage?
Standardize Your SQL Server Installs
• Automate the install
• Start with the OS. Usually the easiest and “biggest bang for the buck” for the organization.
• If you can, standardize on drive letters to ease scripted installs.
• Script the install. Leverage slipstreaming to minimize after-install work.
• Execute post-install configuration scripts automatically as well:
• Rename / disable sa login & change password
• Configure Database Mail
• Set up alerts & notifications
• Any other defaults you want to set.
In Summary
• Understanding the Risk
• Finding Servers
• Checking the Data
• Standards & Policy
Questions?
K. Brian Kelley
Email: kbriankelley@acm.org
Twitter: @kbriankelley
Infrastructure/Security Blog: http://truthsolutions.wordpress.com
Personal Development Blog: http://gkdba.wordpress.com

More Related Content

PPTX
Getting started with Azure Cognitive services
PPTX
Consuming REST in .NET
PPTX
How Elastic Security Meets SOC Needs
PPTX
Test driving Azure Search and DocumentDB
PDF
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
PDF
Azure Application insights - An Introduction
PDF
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
PDF
Search UI and Lucidworks View: Presented by Josh Ellinger, Lucidworks
Getting started with Azure Cognitive services
Consuming REST in .NET
How Elastic Security Meets SOC Needs
Test driving Azure Search and DocumentDB
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
Azure Application insights - An Introduction
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
Search UI and Lucidworks View: Presented by Josh Ellinger, Lucidworks

What's hot (20)

PDF
Building Search Engines - Lucene, SolR and Elasticsearch
PPTX
Debezium POC
PDF
Search for all with Elastic Enterprise Search
PPTX
Elasticsearch for Autosuggest in Clojure at Workframe
PDF
O365Con19 - Azure Blackbelt - Jussi Roine
PPTX
Tokyo azure meetup #2 big data made easy
PPTX
Monitoring your workload hosted on Microsoft Azure
PDF
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
PDF
Jinchao demo
PDF
A Survey of Elasticsearch Usage
PPTX
Design for scale
PDF
Monitoring real-life Azure applications: When to use what and why
PPTX
Azure operational insights
PPTX
Building Enterprise Search Engines using Open Source Technologies
PPTX
Cloud Design Patterns
PDF
[Webinar] Nuxeo Platform 5.6 Overview
PDF
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
PPTX
Enterprise Content Management Solutions in SharePoint and Office 365
PPTX
PDF
Securing java web applications
Building Search Engines - Lucene, SolR and Elasticsearch
Debezium POC
Search for all with Elastic Enterprise Search
Elasticsearch for Autosuggest in Clojure at Workframe
O365Con19 - Azure Blackbelt - Jussi Roine
Tokyo azure meetup #2 big data made easy
Monitoring your workload hosted on Microsoft Azure
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
Jinchao demo
A Survey of Elasticsearch Usage
Design for scale
Monitoring real-life Azure applications: When to use what and why
Azure operational insights
Building Enterprise Search Engines using Open Source Technologies
Cloud Design Patterns
[Webinar] Nuxeo Platform 5.6 Overview
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
Enterprise Content Management Solutions in SharePoint and Office 365
Securing java web applications
Ad

Similar to Geek Sync | Taking Control of Your Organization’s SQL Server Sprawl (20)

PDF
Hardening a SQL Server 2008 Implementation
PDF
7 steps to effective SQL Server monitoring
PDF
Microsoft Sql Server 2008 Administrators Pocket Consultant 1st Edition Willia...
PDF
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
PDF
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
PDF
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
PPT
Fortress SQL Server
PPTX
Microsoft SQL Server 2008 R2 - Manageability Presentation
PPT
SQL Server Security - Attack
PPTX
Monitoring Microsoft SQL Server 2008 with Opsview
PDF
How to manage and monitor large sql server estates
PPTX
Everything you should already know about MS-SQL post-exploitation
PPT
SQL Server Basics Hello world iam here.ppt
DOCX
Sql server 2008 r2 security overviewfor admins
PPTX
Ultimate Free SQL Server Toolkit
PDF
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
PDF
ITS Forefront Management Server Infrastructure Build
PPTX
Do More With Less: SQL Central Management Server and Multi-Server Administration
PDF
OSMC 2010 | NSClient++ - what's new? And what's coming! by Michael Medin
PPT
Under New Management
Hardening a SQL Server 2008 Implementation
7 steps to effective SQL Server monitoring
Microsoft Sql Server 2008 Administrators Pocket Consultant 1st Edition Willia...
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
Fortress SQL Server
Microsoft SQL Server 2008 R2 - Manageability Presentation
SQL Server Security - Attack
Monitoring Microsoft SQL Server 2008 with Opsview
How to manage and monitor large sql server estates
Everything you should already know about MS-SQL post-exploitation
SQL Server Basics Hello world iam here.ppt
Sql server 2008 r2 security overviewfor admins
Ultimate Free SQL Server Toolkit
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
ITS Forefront Management Server Infrastructure Build
Do More With Less: SQL Central Management Server and Multi-Server Administration
OSMC 2010 | NSClient++ - what's new? And what's coming! by Michael Medin
Under New Management
Ad

More from IDERA Software (20)

PPTX
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
PPTX
Problems and solutions for migrating databases to the cloud
PPTX
Public cloud uses and limitations
PPTX
Optimize the performance, cost, and value of databases.pptx
PPTX
Monitor cloud database with SQL Diagnostic Manager for SQL Server
PPTX
Database administrators (dbas) face increasing pressure to monitor databases
PPTX
Six tips for cutting sql server licensing costs
PDF
Idera live 2021: The Power of Abstraction by Steve Hoberman
PDF
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
PDF
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
PDF
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
PDF
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
PDF
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
PDF
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
PDF
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
PPTX
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
PPTX
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
PPTX
Benefits of Third Party Tools for MySQL | IDERA
PPTX
Achieve More with Less Resources | IDERA
PPTX
Benefits of SQL Server 2017 and 2019 | IDERA
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
Problems and solutions for migrating databases to the cloud
Public cloud uses and limitations
Optimize the performance, cost, and value of databases.pptx
Monitor cloud database with SQL Diagnostic Manager for SQL Server
Database administrators (dbas) face increasing pressure to monitor databases
Six tips for cutting sql server licensing costs
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig M...
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
Benefits of Third Party Tools for MySQL | IDERA
Achieve More with Less Resources | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA

Recently uploaded (20)

PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
ai tools demonstartion for schools and inter college
PDF
top salesforce developer skills in 2025.pdf
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
System and Network Administration Chapter 2
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
System and Network Administraation Chapter 3
Designing Intelligence for the Shop Floor.pdf
Odoo Companies in India – Driving Business Transformation.pdf
CHAPTER 2 - PM Management and IT Context
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How to Migrate SBCGlobal Email to Yahoo Easily
Computer Software and OS of computer science of grade 11.pptx
Understanding Forklifts - TECH EHS Solution
2025 Textile ERP Trends: SAP, Odoo & Oracle
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
wealthsignaloriginal-com-DS-text-... (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Reimagine Home Health with the Power of Agentic AI​
ai tools demonstartion for schools and inter college
top salesforce developer skills in 2025.pdf
VVF-Customer-Presentation2025-Ver1.9.pptx
System and Network Administration Chapter 2
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
System and Network Administraation Chapter 3

Geek Sync | Taking Control of Your Organization’s SQL Server Sprawl

  • 1. Taking Control of Your Organization’s SQL Server Sprawl July 26, 2017
  • 2. About Me • Infrastructure and security architect • Database Administrator / Architect • Former Incident Response team lead • Certified Information Systems Auditor (CISA) • SQL Server security columnist / blogger • Editor for SQL Server benchmarks at Center for Internet Security
  • 3. My Contact Information K. Brian Kelley Email: kbriankelley@acm.org Twitter: @kbriankelley Infrastructure/Security Blog: http://truthsolutions.wordpress.com Personal Development Blog: http://gkdba.wordpress.com
  • 4. • Understanding the Risk • Finding Servers • Checking the Data • Standards & Policy
  • 6. Risk Areas • Data, Data, Data! • Lateral movement by adversaries • Licensing
  • 8. Servers on the Network • SSMS drop down and sqlcmd –L • SQL Ping and variants • Dedicated scanners • 3rd party dedicated scanning tools
  • 9. Caution with Scanning • May be seen as “hacking activity” • Know exactly what you’re going to do • Check with your security folks so they understand • Get permission in writing (email counts as long as it gets saved) • Make sure that permission comes from someone with authority to give it.
  • 10. Hidden from the network? • Network libraries disabled • OS Firewall turned on • Listening on a non-standard port • “Crafty” start and stop of services
  • 11. Finding Hidden SQL Servers • Inventory / Configuration Management Tool • Need Admin rights. May need Domain Admin based on default permissions. • Understand how data is collected. • Can’t rely on Add/Remove Programs data • SQL Server is installed. What component? • Exchange issue – have to query for services installed to verify it’s the server.
  • 13. Found the Server… What’s Next? • At this point, it doesn’t matter if it’s authorized. • We want to know what’s on it. • Looking for Shadow IT. • Looking for unprotected data.
  • 14. Investigating the Data • Look for same database names as production • Then look for pattern matches (PayRollDB_20170701 matched by PayRollDB%) • Use object names from production to look for matches on discovered DBs • Then start looking at the data.
  • 16. What are your organization’s standards? • What’s permitted? • Is it in writing? • What are the consequences for an unauthorized SQL Server? • Who is allowed to remediate? • What are they allowed to do? • Are there audit & compliance requirements you can leverage?
  • 17. Standardize Your SQL Server Installs • Automate the install • Start with the OS. Usually the easiest and “biggest bang for the buck” for the organization. • If you can, standardize on drive letters to ease scripted installs. • Script the install. Leverage slipstreaming to minimize after-install work. • Execute post-install configuration scripts automatically as well: • Rename / disable sa login & change password • Configure Database Mail • Set up alerts & notifications • Any other defaults you want to set.
  • 18. In Summary • Understanding the Risk • Finding Servers • Checking the Data • Standards & Policy
  • 19. Questions? K. Brian Kelley Email: kbriankelley@acm.org Twitter: @kbriankelley Infrastructure/Security Blog: http://truthsolutions.wordpress.com Personal Development Blog: http://gkdba.wordpress.com