Limiting SQL Server Exposure

Slides:



Advertisements
Similar presentations
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Advertisements

Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
Security Pertemuan 7 Matakuliah: T0413 Tahun: 2009.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
Chapter 7 HARDENING SERVERS.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Terminal Server © N. Ganesan, Ph.D.. Reference Thin-Client Concept Thin-Client concept tutorial.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Administering Your.
Week 2 - Installation SQL SERVER2000 ENTERPRISE EDITION INSTALLATION.
Database Security Managing Users and Security Models.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Administration of Users Dr. Gabriel. 2 Documentation of User Administration Part of the administration process Reasons to document: –Provide a paper trail.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Today’s Objectives Chapters 10 and 11 Security in SQL Server –Manage server logins and database users. –Manage server-level, database-level, and application.
Maintaining a Mirrored Database Tips and Tricks by Paul G. Hiles.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Learningcomputer.com SQL Server 2008 Configuration Manager.
1 SQL Server 2000 Administration Kashef Mughal MSB.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
MICROSOFT SQL SERVER 2005 SECURITY  Special Purpose Logins and Users  SQL Server 2005 Authentication Modes  Permissions  Roles  Managing Server Logins.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Module 14 Configuring Security for SQL Server Agent.
NT4 SP4 Security Jack Schmidt - Fermilab
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Database Role Activity. DB Role and Privileges Worksheet.
TCOM Information Assurance Management System Hacking.
Module 7: Implementing Security Using Group Policy.
Esri UC 2014 | Technical Workshop | Administering Your Microsoft SQL Server Geodatabase Shannon Shields Chet Dobbins.
Module 1 Introduction to SQL Server® 2008 R2 and its Toolset.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
SQL SERVER AUDITING. Jean Joseph DBA/Consultant Contact Info: Blog:
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
Introduction to SQL Server for Windows Administrators Presented to WiNSUG 02/05/09 Bret Stateham Owner, Net Connex Blogs.netconnex.com.
SQL Server Security The Low Hanging Fruit. Lindsay Clark Database Administrator at American Credit Acceptance
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Defense In Depth: Minimizing the Risk of SQL Injection
SQL Database Management
Module 1: SQL Server Overview
Stop Those Prying Eyes Getting to Your Data
SQL Server Security & Intrusion Prevention
# 66.
Securing Data with SQL Server 2016
Chapter 5 : Designing Windows Server-Level Security Processes
Common SQL Server Mistakes and How to Avoid Them
Introduction to SQL Server 2000 Security
Common Security Mistakes
DevOps Database Administration
Limiting SQL Server Exposure
The Dirty Business of Auditing
DevOps Database Administration
Migrating your SQL Server Instance
Lesson 16-Windows NT Security Issues
Making PowerShell Useful
Outsourcing Database Administration
Operating System Hardening
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Limiting SQL Server Exposure Presented by H. Ross Reed Email – hrreed_2000@yahoo.com Twitter @SQLSERVGUY

About Me DBA for 20 Years SQL Server (since 6.5) DB2 Oracle Developer prior to being a DBA Sr Database Administrator for The OCC. CO-President Chicago SQL Server Users Group

OPTIONS CLEARING CORPORATION SIFMU Systemically Important Financial Market Utility Designation by the SEC CFTC FED We are audited to assure we meet standards for a secure environment

Exposure from Who ? External … Internet facing servers .. Internal Exposure Dishonest Associate The individual that’s curious about the environment The one that doesn’t want to take the time to go through proper channels

Name this Account This account is known for administrating SQL Server and is the first account in Syslogins with an internal id of X’01’.

SA Windows Only Authentication this isn’t an issue DBA’s use a Windows authentication ID Disable SA Rename SA to a different name Available since SQL 2005 Longer names are better Complex Password Change it Often

Lab Renaming and Disabling SA

OS Rights Needed by Instance Account Does not need to be Local System Administrator and should not be. Installer will automatically grant the rights needed. SQL Server Configuration Manager will grant the same rights when used to change the Instance ID . Rights Needed Logon as a Service Replace process level token Adjust memory quotas for a process More information can be found here : https://docs.microsoft.com/en- us/sql/database-engine/configure-windows/configure-windows-service- accounts-and-permissions

Instance Account Additional Use a Domain Id and use a different id for each Instance and Each SQL Server Service. Don’t do this !!!

SYSADMIN Fixed Server Role When Installing Make sure DBA’s are installed in SYSADMIN Most powerful role on the Instance Most System Stored Procedures check if the id running is SYSADMIN and then bypasses security checks. Third Party Applications “We need to run as SYSADMIN” Probably don’t need that level of security to run just to install Probably run as DB Owner

What is Default TCP/IP Port for SQL Server

Change Default Port Number Change to port number other than well known port for TCP protocol

Named Pipes Vs TCP/IP TCP/IP supports Kerberos authentication better security protocol than NTLM Named Pipes has to use NTLM Usually Named Pipes and TCP/IP aren’t needed So disable Named Pipes

Disable Named Pipes

Hide an Instance Hides instance from Network Won’t display in the dropdown box

Before and After Hiding Instance

Disable SQL Server Browser Has information on Instance Name and Port Number of Instances Allows to connect with ServerName \InstanceName

Connection To Instance Server Name,Port HRREED,4050

Surface Area Configuration Settings Remain Disabled OLE Automation – Sp_OA stored procedures can be used to access OS files. sp_OACreate, sp_OADestroy, sp_OAMethod, sp_OASetProperty, sp_OAGetProperty XP_CMDSHELL - Executes Dos Shell commands using service account rights Adhoc Remote Queries – Use Linked Server , SSIS, or PowerShell Database Mail XP’s SQL Mail XP’s – Allows user to send emails

Guest Account Any User who can connect to the server has access to a database where Guest is enabled Master, MSDB, TempDB require the Guest user enabled Disable Guest in Model Database so that user Databases created will have Guest Disabled Revoke Connect from guest

Backups Encrypt Backups Use Virtual Tape instead of Physical Tape Transparent Data Encryption Third Party Tools Quest Litespeed Redgate Backup Idera SQL Safe Backup Use Virtual Tape instead of Physical Tape Data Domain Guard access to Backups - Access to the File System should be restricted

Policy Based Management Introduced with SQL Server 2008 Allows DBA to create conditions and Policies to block changes or report changes

Lab # 2 Policy Based Management

Auditing -Scan Error Log Error Log look for Login Failures Make sure setting is set to capture failed Logins Restart is required for the change in Login Auditing to take effect

Server Side Auditing Available since SQL Server 2008 Allows Auditing Login’s and other items such as schema changes

Login Failures using Server Side Auditing Defining The Audit Choices for Destination File, Application Log, Security Log

Login Audits More than Failures

Set up Audit for Logins Failures and Changes Lab # 3 Set up Audit for Logins Failures and Changes

Schema Changes CREATE SERVER AUDIT SPECIFICATION [ServerAuditSpecification] FOR SERVER AUDIT [SchemaChangeTrack] ADD (DATABASE_ROLE_MEMBER_CHANGE_GROUP), ADD (DATABASE_PERMISSION_CHANGE_GROUP), ADD (DATABASE_OBJECT_PERMISSION_CHANGE_GROUP), ADD (SCHEMA_OBJECT_PERMISSION_CHANGE_GROUP), ADD (SERVER_OBJECT_PERMISSION_CHANGE_GROUP), ADD (DATABASE_PRINCIPAL_IMPERSONATION_GROUP), ADD (DATABASE_CHANGE_GROUP), ADD (DATABASE_OBJECT_CHANGE_GROUP), ADD (DATABASE_PRINCIPAL_CHANGE_GROUP), ADD (SCHEMA_OBJECT_CHANGE_GROUP), ADD (SERVER_OBJECT_CHANGE_GROUP), ADD (APPLICATION_ROLE_CHANGE_PASSWORD_GROUP), ADD (DATABASE_OWNERSHIP_CHANGE_GROUP), ADD (DATABASE_OBJECT_OWNERSHIP_CHANGE_GROUP), ADD (SCHEMA_OBJECT_OWNERSHIP_CHANGE_GROUP) WITH (STATE = ON) GO

Separation of Duties Windows System Administrator Installs SQL Server Patches SQL Server Security Administrator Creates Instance ID Creates SQL Authenticated ID Database Administrator Responsible for Backup and Recovery Schema Changes

Some Things External to SQL Server Segregation of Networks Separate Production / Test / Dev Separate Network for IoT Heating and Air Conditioning Target Stores

Sources Securing SQL Server – Denny Cherry Center for Internet Security https://www.cisecurity.org/cis-benchmarks/ Pinal Dave https://blog.sqlauthority.com