DBA 911!: For Database Environments In Crisis by Chris Hall
Author:Chris Hall
Language: eng
Format: azw3
Publisher: Chris Hall
Published: 2016-11-25T08:00:00+00:00
Security Checklist
As a general rule, the follow security checklist will give you a great start to securing your database environment. If you happen to have an exception that prevents you from enforcing a security best practice it must be documented and I also recommend having the appropriate stakeholders signing a document stating they are aware that in this case you cannot implement best practice and what the risks may be.
Prevent unauthorized users from access to your servers physical.
Install only what is required on your SQL Server instances.
Allow only the bare minimum number of sysadmins required access to the SQL Server.
Disable the SA account and rename it. If the SA account *MUST* be used, then give it a very complex password
Follow the rule of least privilege and only grant the minimal amount of permissions to users required to perform their job.
Use stored procedures or views to allow users to access data instead of letting them directly access tables.
When possible, use Windows Authentication logins instead of SQL Server logins.
Always use strong passwords for all SQL Server login accounts.
Never grant permissions to the public database role.
Delete sample databases from all production SQL Server instances.
Configure login auditing so you can see both successful and failed log ins.
Never use login IDs that are members of the sysadmin group as accounts used to access SQL Server from applications.
Ensure that your SQL Servers are behind a firewall and are not exposed directly to the Internet.
In SQL Server 2005 and earlier, remove the BUILTIN/Administrators group to prevent local server administrators from being able to access SQL Server.
Run each separate SQL Server service under a different Windows domain account.
Only give SQL Server service accounts the minimum rights and permissions needed to run the service. In most cases, local administrator rights are not required, and domain administrator rights are *NEVER* needed.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6789)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6765)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6651)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6438)
Driving Data Quality with Data Contracts by Andrew Jones(6377)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6138)
Learning SQL by Alan Beaulieu(6004)
Weapons of Math Destruction by Cathy O'Neil(5795)
Big Data Analysis with Python by Ivan Marin(5388)
Data Engineering with dbt by Roberto Zagni(4393)
Solidity Programming Essentials by Ritesh Modi(4042)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3899)
Pandas Cookbook by Theodore Petrou(3601)
Blockchain Basics by Daniel Drescher(3305)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2914)
Feature Store for Machine Learning by Jayanth Kumar M J(2819)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2802)
Mastering Python for Finance by Unknown(2748)
