Performing a SQL Server Security Risk Assessment K. Brian Kelley, Microsoft Data Platform (SQL Server) MVP.

Slides:



Advertisements
Similar presentations
TIPS Threat Assessment, Incident Management and Prevention Services.
Advertisements

Chapter 9 Security. Endpoints  A SQL Server endpoint is the point of entering into SQL Server.  It is implemented as a database object that defines.
Logins, Roles and Credentials Lesson 14. Skills Matrix.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Mike Fal - SQL SERVER SECURITY GRANTING, CONTROLLING, AND AUDITING DATABASE ACCESS March 17, 2011.
Introduction to Network Defense
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Using Security Best Practices to Lockdown Your Databases and Applications K. Brian Kelley Charlotte SQL Server User Group 17 February 2009.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Today’s Objectives Chapters 10 and 11 Security in SQL Server –Manage server logins and database users. –Manage server-level, database-level, and application.
[Limited Access] Content:  Purpose  Mechanism  Difficulty  Proposal Database Security & Audit Proposal.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Chapter 6 : Designing SQL Server Service-Level Security MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design Study Guide.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
MICROSOFT SQL SERVER 2005 SECURITY  Special Purpose Logins and Users  SQL Server 2005 Authentication Modes  Permissions  Roles  Managing Server Logins.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Surviving Reaffirmation: Two TSTC Approaches to Compliance & the QEP Texas Association for Institutional.
Module 4: Managing Security. Overview Implementing an Authentication Mode Assigning Login Accounts to Users and Roles Assigning Permissions to Users and.
SQL Server Security By Mattias Lind For PASS Security VC.
October 1-2 Ølensvåg. AppFrame SQL – Security Session Code: SQL-201-Security Speaker(s): Jekaterina Golouchova.
Copyright © 2013 Curt Hill Database Security An Overview with some SQL.
Module 10 Assigning Server and Database Roles. Module Overview Working with Server Roles Working with Fixed Database Roles Creating User-defined Database.
O PASS – M ARCH 8, 2012 K. Brian Kelley MCSE, CISA, Security+, MVP-SQL Server The Dirty Business of Auditing Auditing SQL Server (2000 – 2008R2)
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
INTRO TO SQL SERVER SECURITY By Robert Biddle
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
1 Chapter Overview Granting Database-Specific Permissions Using Application Roles Designing an Access and Permissions Strategy.
SQL Server Permissions and Security Principals William Assaf Sparkhound, Inc. SQLSAT CLUTCH CITY 2015.
Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile.
SQL Server Security The Low Hanging Fruit. Lindsay Clark Database Administrator at American Credit Acceptance
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
WELCOME! SQL Server Security. Scott Gleason This is my 9 th Jacksonville SQL Saturday Over ten years DBA experience Director of Database Operations
Project Management PTM721S
SQL Implementation & Administration
IST VLabs Tutorial Fall 2010 Dongwon Lee, Ph.D..
Building a Home Grown Auditing Infrastructure for SQL Server
Administrating a Database
Building A Security Program From The Ground Up
Performing a SQL Server Security Risk Assessment
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Chapter One: Mastering the Basics of Security
Protecting Data Across the Environment
Compliance with hardening standards
Service Owner: Andrea Beesing 9 February 2016
Access, Users, Permissions
What if tomorrow never comes
Exploiting SQL Server Security Holes
Common Security Mistakes
Designing Database Solutions for SQL Server
SQL Server Security Mistakes Everyone Makes
Design and Maintenance of Web Applications in J2EE
The Dirty Business of Auditing
5 WAYS TO BYPASS *OR ENSURE* SQL SERVER SECURITY MATT MARTIN
Securing SQL Server Processes with Certificates
AppExchange Security Certification
Implementing Database Roles in the Enterprise Geodatababse
Back-End Data Security
IS4680 Security Auditing for Compliance
Copyright © 2013 – 2018 by Curt Hill
Security week 1 Introductions Class website Syllabus review
Administrating a Database
Information Security Risks; All-in-One Terminology
In the attack index…what number is your Company?
Mark Quirk Head of Technology Developer & Platform Group
We Need To Talk Security
Michael Stephenson Microsoft MVP - Azure
Presentation transcript:

Performing a SQL Server Security Risk Assessment K. Brian Kelley, Microsoft Data Platform (SQL Server) MVP

Author Page 2 Infrastructure and security architect Database Administrator / Architect Former Incident response team lead Certified Information Systems Auditor (CISA) SQL Server security columnist / blogger Editor for SQL Server benchmarks at Center for Internet Security

Agenda Page How to Present to Management Server Level Concerns Database Level Concerns Putting It All Together 3

Agenda Page How to Present to Management Server Level Concerns Database Level Concerns Putting It All Together 4

What We Usually Do We describe what can happen General assumptions are made Is this enough? NO!

What We Must Do Answer these questions: How likely is an incident to occur in a year? How much will the damage cost? How much will remediation cost?

How Likely Is Hard Let’s Use a Scale: –High –Medium –Low Let’s Color Code the Scale –Red: High –Yellow: Medium –Green: Low 7

Example from the Community Brent Ozar Unlimited’s sp_blitz: 8

Other Community Resources Security Tips: Audit & Compliance Tips: compliance/ My Tips (Heavily Security & Audit): 9

Risk Assessment Types Qualitative vs. Quantitative 10

Qualitative Example An attacker breaches our web application: –Gets personal identification data –Gets credit card numbers How likely? –Not very. We’re good! What else? –Publicity hit. –Notifications. Can we measure any of this?

Quantitative Example Likelihood Estimate: Once every 3 years (or Medium/Yellow) Total Cost: $43.5M –Customer Notification: $1.5M –Loss of Business: $37M –Fix Security Hole: $5M Annual Loss Expectancy (ALE) = Cost X Likelihood in a Year Our Example: $43.5M X (1/3) = $14.5M Think we can get that extra 6 weeks for code review / security fixes now?

Do Quantitative Risk Assessment Yes, it is harder to do. Yes, it is more time consuming. But what does the Business work on? You provide reasons to justify spending.

Agenda Page How to Present to Management Server Level Concerns Database Level Concerns Putting It All Together 14

High Risk Items App/Dev use of sa App/Dev use of any sysadmin role members App/Dev use of securityadmin role members App/Dev use of IMPERSONATE as those logins App/Dev use of logins with CONTROL SERVER 15

Medium Risk Items Windows users (not groups) as logins SQL Server logins for people SQL Server logins when apps use Windows SQL Server logins that don’t use password policies 16

Low Risk Items “Too many” logins BUILTIN\Administrators 17

Agenda Page How to Present to Management Server Level Concerns Database Level Concerns Putting It All Together 18

High Risk Items App/Dev Use of DB owner App/Dev Use of db_owner role members App/Dev Use of db_ddladmin role members Sensitive data which is not encrypted Improper backup/recovery scheme 19

Medium Risk Items Use of cross database ownership chaining unnecessarily Users having direct update access 20

Low Risk Items Use of db_datareader and db_datawriter roles Use of dbo schema 21

Agenda Page How to Present to Management Server Level Concerns Database Level Concerns Putting It All Together 22

Putting It All Together You Want a Formal Write-Up Executive Summary Order Your Information Prepare Auxiliary Documents 23

How to Build the Write-Up Order Your Information First Prepare Your Auxiliary Documents Next Then Write the Bulk of Your Report Finish with the Executive Summary 24

Tips for Acceptance “A picture is worth a thousand words” Prioritized charts help Communicate in money Pick your battles 25

Questions and Wrap-up 26