null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
479317
SQL Security Policy
Description
Mind Map on SQL Security Policy, created by seanie_32 on 13/01/2014.
Mind Map by
seanie_32
, updated more than 1 year ago
More
Less
Created by
seanie_32
almost 11 years ago
67
2
0
Resource summary
SQL Security Policy
Physical
Disaster Recovery
Ensure the disaster recovery plan is up to date
Off-site back-up + secure
Fireproof / Flood proof / Offline
Physical Access
Ensure physical access to server is restricted
Server can't be turned off / disconnected / plug in keyboard or USB stick
Software
Anti - Virus
Ensure that anti-virus is running
Has been tuned correctly
Unnecessary directories are excluded to improve performance
Exclusions and test loading have been completed
Configure Firewall
Open TCP 3306 for MySQL
Keep as many ports closed as possible
Use SSH tunnel for testing as this does not expose server across web
Vendor Updates
Ensue that server packs / hot fixes / patches are applied frequently
Both at server and MySQL level
This fixes security risks and loopholes Results in less risk of intrusion
Unwanted Services
These added services could give side-door access, introducing something unexpected
Linux – use “rcconf” removal tool to remove unwanted services
Access Restrictions on Server
Restrict remote access - SOCKET
Socket on network layer model
Connects two computers together
Linux – skip-networking
This stops it from opening socket connections
Ties connection down to local host
Needs to go into .ini file
Restrict remote access – LOCALHOST
Bind-address = 127.0.0.1
Forces SQL to listen only to localhost
Can’t accept connections from anywhere else
Preventing access from TCP3306 from outside source
Restrict remote access – GRANT
Defines who and where they will be hosted from
Ties down specific database and specific user
GRANT SELECT, INSERT ON mydb.* TO ‘someuser’@’somehost’;
Database Changes
Disable LOCAL INFILE
Prevents access to local files (eg. /etc/passwd) Stops some SQL injection attacks.
Change root directory
/chroot/mysql
socket = /chroot/mysql/tmp/mysql.sock
Remove test database
Can be test databases installed with MySQL
Allows anonymous access to database
DROP DATABASE test;
Drop the test and any other unwanted databases
Remove test accounts
SHOW GRANTS FOR ‘’@’localhost’;
DROP USER “”;
Delete account shipped with MySQL
Make sure created accounts are tied down to relevant tables
Change rootname and password
Should upgrade to version 5 as privileges stay on previous versions.
MySQL > RENAME USER root TO new_user;
Lower privileges
Version 5 and above has pre-set restrictions
Set ownership to MySQL user:
shell>ls -l /var/lib/mysql
Only allow MySQL and root access: shell>ls -l /usr/bin/my
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
The History Boys - Revision
121197cm
Physical Geography
littlegoulding
unit 1 f321 chemistry ocr
methmip
GCSE Geography: Tourism AQA
varadhuzurbazar
Algebraic Fractions
Olivia McKenzie
OCR AS Biology F211 Transport in plants.
Megan Vann
Biology B2.3
Jade Allatt
Python Quiz
karljmurphy
Language Features - Unfamiliar Text
Jessie Jacobs
Great Expectations
ccoutinho2043
I always Feel Tired
Fatma Shwaylia
Browse Library