Presentation is loading. Please wait.

Presentation is loading. Please wait.

Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile.

Similar presentations


Presentation on theme: "Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile."— Presentation transcript:

1 Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile slides, etc.) are available to you in the slide master.

2 Grid Use this grid to align your copy, imagery and charts/graphs.

3 Jasmin Azemović, Ph.D, MVP, MCT Fakultet informacijskih tehnologija, Mostar jasmin@edu.fit.ba, www.youtube.com/mvpdba SQL Server Threats and Countermeasuers

4 Inspirirani ljudima. Ugasite mobitele. Hvala.

5

6 Agenda SQL Server Security Model Threat Modeling Security during and after installation Threats from authorized users Physically data stealing Data transfer sniffing SQL code injection Auditing

7 SQL Server Security Model SQL Server security model is very granular. You can set it up from: Servers-side Database-side Table/Object/Column-level LoginAuthenticationAuthorization Server side Backup files, configuration...Database sideObjects and dataTables, views, columns

8 Threat modeling is a formalized process of describing security aspects of a system. Minimize the potential cost Minimize need to rework code Locate and eliminate security risks Threat Modeling System diagram Identify threats Mitigate Validate solution

9 Example of threat model

10 Security during and after installation Security Steps During Installation Service Accounts Types of Authentication Administrator Account Security Steps After Installation Using SQL Server Configuration Manager Working with Windows Firewall SQL Server Resources Consumers Types of SQL Server Consumers Password Issues Password Policy

11 Examples:

12 Threats from authorized users „Inner“ threats are more dangerous : False sense of security Do we trust our users ? User roll is not enough to ensure security and privacy elements

13 Examples: Read permission Database, Schema, Table,...  BI/Reporting  Power Users  Information consumers So where is problem here? User can read “private” tables !

14 Countermeasures Explicit deny on specific object(s) Table, column... DENY will override GRANT Don‘t use direct access... use views, sp‘s, schema‘s Don't allow ad-hoc queries in production Use: Policy Management Resource Governor

15

16 Physically Data Stealing This threat is ignored...why? Weak Points Inside/Outside of SQL Server envinroment https://www.privacyrights.org/

17 Two major areas where a database can be compromised Weak Points Inside SQL Server envinroment Inside threats Data files AttachDetach Backup files Copying

18 The area where risk is outside of SQL Server jurisdiction Weak Points Outside of SQL Server Outside threats File system Operating system Network

19 What we can do on SQL Server? Client SQL Server Instance Client file system Backup files Communication SQL Server data files

20 What we can do on SQL Server? Client SQL Server Instance Client file system Communication Backup files SQL Server data files

21 What we can do on SQL Server? Client SQL Server Instance Client file system SQL Server data files Backup files Communication

22 What we can do on SQL Server? Client SQL Server Instance Client file system Backup files Communication SQL Server data files

23 What we can do on SQL Server? Client SQL Server Instance Client file system Backup files Communication SQL Server data files

24 What we can do on SQL Server? Client SQL Server Instance Client file system Backup files Communication SQL Server data files

25 What we can do on SQL Server? Client SQL Server Instance Client file system Backup files Communication SQL Server data files

26 Countermeasures SQL Server countermeasures Table/column encryption Transparent Database Encryption-TDE Encrypted backups Using volume encryption BitLocker TrueCrypt Passwords on back-up archives (ZIP, RAR) Limiting the number of administrative staff Efficient audit policy Don‘t carry DB backups on your laptops, usb, sd cards...

27

28 Data Transfer Sniffing SQL Server uses classic client/server communication Anything can happen in the network environment: Communication monitoring Data sniffing Data tampering

29 Why a Firewall is Not Enough? Firewall is a necessary but not a sufficient security condition. Firewall will NOT help in these situations : Poorly written application Bad data access layer Input validation etc.

30 Countermeasures Server can use SSL to encrypt data transfer Encryption level is 40-bit or 128-bit SSL encryption does slow performance

31 SQL Code Injection SQL injection attack exploits vulnerabilities in input validation Occur when your application uses input to construct dynamic SQL statements to access the database Using the SQL injection attack, the attacker can execute custom commands in the database

32 Example: SqlDataAdapter myCommand = new SqlDataAdapter( "SELECT * FROM Users WHERE UserName ='" + txtuid.Text + "'", conn); ; DROP TABLE Customers -- SELECT * FROM Users WHERE UserName=''; DROP TABLE Customers --' SqlDataAdapter myCommand = new SqlDataAdapter( "SELECT * FROM Users WHERE UserName ='" + txtuid.Text + "'", conn); ; DROP TABLE Customers -- SELECT * FROM Users WHERE UserName=''; DROP TABLE Customers --'

33 Countermeasures Perform thorough input validation. Your application should validate input prior to sending a request to the database. Use parameterized stored procedures or SQL parameters Use least privileged accounts to connect to the database.

34 Auditing Digital Evidence Methods for Collecting Data Securing Digital Evidence

35 Digital Evidence SQL Server Profler Triggers (DDL/DML) SQL Server Audit Other tools Digital evidence When?Who?What?

36 Finale facts Databases contain critical information for business; Database servers are kept private, sensitive and secure information; This is the last line of the defense

37 Inspirirani ljudima. Pitanja i odgovori.

38

39


Download ppt "Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile."

Similar presentations


Ads by Google