SlideShare a Scribd company logo
SQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion Prevention
   Recently moved to Colorado Springs
   SQL Server 7, 2000, 2005 and 2008
   .Net Developer VB.Net and C#
   www.extofer.com
   twitter: @extofer
 Security Model
 Authentication
 Passwords
 Threats
 Physical Security and other best practices
   Principal         Windows Users
                        SQL Login
     Windows Users
     SQL Logins
                      Database Users
   Roles                DB Roles
     Groups

   Securables
                        Schemas
     Schemas
   Windows Authentications
     Domain or local Windows Account

     Active Directory Integration

     Supports Groups

     Use Whenever Possible
   Mixed Authentication
     Legacy or Hard Coded Referenced Logins

     Non Windows Clients

     Connections over Internet
SQL Server Security and Intrusion Prevention
   Strong Password
     10 – 12 characters in length
     Use Upper and Lower Case
     Numbers
     Special Characters (symbols)


   l33t speak
     E = 3 or A=4 or @, T= + or 7
     l33t password generator
   DO NOT hardcode passwords
     ASP.Net encrypt web.config
     Encrypt password in your code
 SQLPing checks for default passwords
 Change passwords frequently

   Do Not use the same passwords
 Social Engineering
 SQL Injection
 Beware of Port Sniffers
   Social Engineering
     Manipulating people to gather data
     Not using technical cracking tools or techniques
SQL Server Security and Intrusion Prevention
   SQL Injection
     Vulnerable to any RDBMS, not just MS SQL
      Server
     Attacker post SQL commands via front end
      applications
     Tools: ‘ , --, ;
   Check for Valid Input
   DDL Triggers
   Use Stored Procedures
   Use Parameters
   Customize Error Messages
     Avoid errors returning securable names
   Change default port
SQL Server Security and Intrusion Prevention
SQL Server Security and Intrusion Prevention
 Lock server room or rack when not in use
 Restrict access to unauthorized individuals
 If feasible, use security cameras
 Second Tuesday of every month
 Test updates or hotfixes immediately
  on non-production servers
 Schedule patches soon after tested
 Avoid network shares on servers
 Don’t surf the Web on the server
 Only enable required protocols
 Keep servers behind a firewall
 Encrypt your DB backups
 Test backups by restoring
 Restrict System Stored Proc’s and
  XP
http://www.sqlservercentral.com/Books/
     Defensive Database Programming by Alex Kuznetsov
     Protecting SQL Server Data by John Magnabosco
     SQL Server Tacklebox by Rodney Landrum
Slide Deck at http://www.extofer.com

          Gabriel Villa
       email: extofer@gmail.com
        blog: www.extofer. com
           twitter: @extofer

More Related Content

PPTX
Sql server security in an insecure world
PPTX
Denali Sql Server Security
PPT
Securing you SQL Server - Denver, RMTT
PPT
SQL Server Security
KEY
SQL Server: Security
PPT
Sql Server Security
PPTX
Sql injections (Basic bypass authentication)
PPTX
SQL Server 2012 Security Task
Sql server security in an insecure world
Denali Sql Server Security
Securing you SQL Server - Denver, RMTT
SQL Server Security
SQL Server: Security
Sql Server Security
Sql injections (Basic bypass authentication)
SQL Server 2012 Security Task

What's hot (20)

PPTX
Practice of AppSec .NET
PPT
Top Keys to create a secure website
PDF
Compute Security - Host Security
PPT
Implementing application security using the .net framework
PPTX
ASP.NET security vulnerabilities
PPT
Securing Your .NET Application
PPTX
Sql injection
PPTX
Secure Code Warrior - Trust no input
PPT
Securing you SQL Server
PPTX
SQL Injection Attacks: Is Your Data Secure? .NET Edition
PDF
[OWASP Poland Day] Security knowledge framework
PPTX
Class Project: Security in Microsoft Azure
PPTX
security misconfigurations
PPT
Secure code practices
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
Sql injection
PDF
Web Application Security II - SQL Injection
PDF
Web Application Security 101 - 03 Web Security Toolkit
PPTX
Sql injection attack
Practice of AppSec .NET
Top Keys to create a secure website
Compute Security - Host Security
Implementing application security using the .net framework
ASP.NET security vulnerabilities
Securing Your .NET Application
Sql injection
Secure Code Warrior - Trust no input
Securing you SQL Server
SQL Injection Attacks: Is Your Data Secure? .NET Edition
[OWASP Poland Day] Security knowledge framework
Class Project: Security in Microsoft Azure
security misconfigurations
Secure code practices
CSS 17: NYC - Stories from the SOC
Sql injection
Web Application Security II - SQL Injection
Web Application Security 101 - 03 Web Security Toolkit
Sql injection attack
Ad

Viewers also liked (11)

PPTX
Stroke mimics
PPTX
Evaluating Daily Checklist Against 1000 Servers using Policy Based Management
PPTX
BRAIN CT SCAN
PPTX
Approach to a patient with stroke - Pathophysiology of stroke
PPT
Basic reading computed tomography (ct) of brain
PPT
Approach to a patient with stroke
PPTX
STROKE LECTURE By Arlyn M. Valencia, M.D. Associate Professo University Of Ne...
PPT
Approach to head ct
PPTX
Stroke syndromes
PPTX
BASICS of CT Head
Stroke mimics
Evaluating Daily Checklist Against 1000 Servers using Policy Based Management
BRAIN CT SCAN
Approach to a patient with stroke - Pathophysiology of stroke
Basic reading computed tomography (ct) of brain
Approach to a patient with stroke
STROKE LECTURE By Arlyn M. Valencia, M.D. Associate Professo University Of Ne...
Approach to head ct
Stroke syndromes
BASICS of CT Head
Ad

Similar to SQL Server Security and Intrusion Prevention (20)

PPT
Fortress SQL Server
PPTX
SqlSa94
PPTX
Geek Sync | SQL Security Principals and Permissions 101
PDF
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
PDF
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
PPTX
The Spy Who Loathed Me - An Intro to SQL Server Security
PPTX
SQL Injection Attacks cs586
PPTX
PDF
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
PPT
SQL Server Security - Attack
PPT
Application Security Part 1 Threat Defense In Client Server Applications ...
PPTX
Secure Software Engineering
PPT
Where should I be encrypting my data?
PDF
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
PDF
Dr3150012012202 1.getting started
PPTX
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
PPTX
SQLi for Security Champions
PPTX
Unit 2 - Chapter 7 (Database Security).pptx
PPTX
Sql injection
PPSX
Web application security
Fortress SQL Server
SqlSa94
Geek Sync | SQL Security Principals and Permissions 101
KoprowskiT_SQLRelayCaerdydd_SQLSecurityInTheClouds
KoprowskiT_SQLRelayBirmingham_SQLSecurityInTheClouds
The Spy Who Loathed Me - An Intro to SQL Server Security
SQL Injection Attacks cs586
KoprowskiT_SQLSatHolland_SQLServerSecurityInTheCloud
SQL Server Security - Attack
Application Security Part 1 Threat Defense In Client Server Applications ...
Secure Software Engineering
Where should I be encrypting my data?
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
Dr3150012012202 1.getting started
Modern Data Security for the Enterprises – SQL Server & Azure SQL Database
SQLi for Security Champions
Unit 2 - Chapter 7 (Database Security).pptx
Sql injection
Web application security

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

SQL Server Security and Intrusion Prevention

  • 3. Recently moved to Colorado Springs  SQL Server 7, 2000, 2005 and 2008  .Net Developer VB.Net and C#  www.extofer.com  twitter: @extofer
  • 4.  Security Model  Authentication  Passwords  Threats  Physical Security and other best practices
  • 5. Principal Windows Users SQL Login  Windows Users  SQL Logins Database Users  Roles DB Roles  Groups  Securables Schemas  Schemas
  • 6. Windows Authentications  Domain or local Windows Account  Active Directory Integration  Supports Groups  Use Whenever Possible
  • 7. Mixed Authentication  Legacy or Hard Coded Referenced Logins  Non Windows Clients  Connections over Internet
  • 9. Strong Password  10 – 12 characters in length  Use Upper and Lower Case  Numbers  Special Characters (symbols)  l33t speak  E = 3 or A=4 or @, T= + or 7  l33t password generator
  • 10. DO NOT hardcode passwords  ASP.Net encrypt web.config  Encrypt password in your code  SQLPing checks for default passwords  Change passwords frequently  Do Not use the same passwords
  • 11.  Social Engineering  SQL Injection  Beware of Port Sniffers
  • 12. Social Engineering  Manipulating people to gather data  Not using technical cracking tools or techniques
  • 14. SQL Injection  Vulnerable to any RDBMS, not just MS SQL Server  Attacker post SQL commands via front end applications  Tools: ‘ , --, ;
  • 15. Check for Valid Input  DDL Triggers  Use Stored Procedures  Use Parameters  Customize Error Messages  Avoid errors returning securable names
  • 16. Change default port
  • 19.  Lock server room or rack when not in use  Restrict access to unauthorized individuals  If feasible, use security cameras
  • 20.  Second Tuesday of every month  Test updates or hotfixes immediately on non-production servers  Schedule patches soon after tested
  • 21.  Avoid network shares on servers  Don’t surf the Web on the server  Only enable required protocols  Keep servers behind a firewall
  • 22.  Encrypt your DB backups  Test backups by restoring  Restrict System Stored Proc’s and XP
  • 23. http://www.sqlservercentral.com/Books/  Defensive Database Programming by Alex Kuznetsov  Protecting SQL Server Data by John Magnabosco  SQL Server Tacklebox by Rodney Landrum
  • 24. Slide Deck at http://www.extofer.com Gabriel Villa email: extofer@gmail.com blog: www.extofer. com twitter: @extofer