|
Book details / order |
MICROSOFT SQL SERVER 2012 SECURITY COOKBOOK OVER 70 PRACTICAL, FOCUSED RECIPES TO BULLET-PROOF YOUR SQL SERVER DATABASE AND PROTECT IT FROM HACKERS AND SECURITY THREATS |
What you will learn from this book
start securing your database right from the first step when you install it
protect your database against brute force attacks, denial-of-service attacks, and sql injection
secure sql server analysis services (ssas) and reporting services (ssrs)
use a sql or web application firewall
perform user authentication and authorization
manage object ownership and protect data through views and stored procedures
create and use certificates, and symmetric and asymmetric encryption keys
authenticate stored procedures by signatures
monitor sql server logs and use dml and ddl trigger for auditing
configure sql server database audit and manage audit resilience after a crash
in detail
in 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. a month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single sql injection attack. in these days of high-profile hacking, sql server 2012 database security has become of prime importance.
"microsoft sql server 2012 security cookbook" will show you how to secure your database using cutting-edge methods and protect it from hackers and other security threats. you will learn the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and sql injection, securing business intelligence, and more.
we will start with securing sql server right from the point where you install it. you will learn to secure your server and network with recipes such as managing service sids, configuring a firewall for sql server access, and encrypting the session by ssl. we will then address internal security : creating logins to connect to sql server, and users to gain access to a database. we will also see how to grant privileges to securable objects on the server or inside the database.
after having managed authentication through logins and users, we will assign privileges inside a database using permissions. we will then learn about symmetric keys, asymmetric keys and certificates, which can be used to encrypt data or sign data and modules with a choice of cipher algorithms, as well as creating hash representations of data.
then we will cover methods to protect your database against brute force attacks, denial-of-service attacks, and sql injection. finally we will learn about auditing and compliance and securing sql server analysis services (ssas) and reporting services (ssrs).
approach
each recipe comprises step-by-step instructions followed by an analysis of what was done in each task and other useful information. the book is designed so that you can read it chapter by chapter, or look at the list of recipes and refer to them in no particular order. each example comes with its expected output to make your learning even easier thus enabling you to successfully secure your sql server 2012 database.
who this book is for
this book is for sql server administrators, developers, and consultants who want to secure their sql server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and sql injection, securing business intelligence, and more.
working knowledge of sql server is expected.
about the author
rudi bruchez is an independent consultant and trainer based in paris, france. he has 15 years of experience with sql server. he has worked as a dba for cnet channel, a subsidiary of cnet, at the mediterranean shipping company (msc) headquarters in geneva and at promovacances, an online travel company in paris. since 2006, he has been providing consulting and audits as well as sql server training. as sql server is evolving into a more complex solution, he tries to make sure that developers and administrators keep mastering the fundamentals of the relational database and the sql language. he has co-authored one of the best-selling books about the sql language in french, which was published in 2008 and is the only french book about sql server optimization. he can be contacted at http://www.babaluga.com/.
table of contents:
preface
chapter 1: securing your server and network
introduction
choosing an account for running sql server
managing service sids
using a managed service account
using a virtual service account
encrypting the session with ssl
configuring a firewall for sql server access
disabling sql server browser
stopping unused services
using kerberos for authentication
using extended protection to prevent authentication relay attacks
using transparent database encryption
securing linked server access
configuring endpoint security
limiting functionalities – xp_cmdshell and openrowset
chapter 2: user authentication, authorization, and security
introduction
choosing between windows and sql authentication
creating logins
protecting your server against brute-force attacks
limiting administrative permissions of the sa account
using fixed server roles
giving granular server privileges
creating and using user-defined server roles
creating database users and mapping them to logins
preventing logins and users to see metadata
creating a contained database
correcting user to login mapping errors on restored databases
chapter 3: protecting the data
introduction
understanding permissions
assigning column-level permissions
creating and using database roles
creating and using application roles
using schemas for security
managing object ownership
protecting data through views and stored procedures
configuring cross-database security
managing execution-plan visibility
using execute as to change the user context
chapter 4: code and data encryption
introduction
using service and database master keys
creating and using symmetric encryption keys
creating and using asymmetric keys
creating and using certificates
encrypting data with symmetric keys
encrypting data with asymmetric keys and certificates
creating and storing hash values
signing your data
authenticating stored procedure by signature
using module signatures to replace cross-database ownership chaining
encrypting sql code objects
chapter 5: fighting attacks and injection
introduction
defining code access security for .net modules
protecting sql server against denial of service
protecting sql server against sql injection
securing dynamic sql from injections
using a sql firewall or web application firewall
chapter 6: securing tools and high availability
introduction
choosing the right account for sql agent
allowing users to create and run their own sql agent jobs
creating sql agent proxies
setting up transport security for service broker
setting up dialog security for service broker
securing replication
securing sql server database mirroring and alwayson
chapter 7: auditing
introduction
using the profiler to audit sql server access
using dml trigger for auditing data modification
using ddl triggers for auditing structure modification
configuring sql server auditing
auditing and tracing user-configurable events
configuring and using common criteria compliance
using system center advisor to analyze your instances
using the sql server best practice analyzer
using policy based management
chapter 8: securing business intelligence
introduction
configuring analysis services access
managing analysis services http client authentication
securing analysis services access to sql server
using role-based security in analysis services
securing reporting services server
managing permissions in reporting services with roles
defining access to data sources in reporting services
managing integration services password encryption.
Author : Rudi buchez
Publication : Packt publication
Isbn : 9789350239575
Store book number : 105
NRS 920.00
|
|
|
|
|
|
|
|
|
|