Microsoft SQL Server 2012 Security Cookbook


Microsoft SQL Server 2012 Security Cookbook
eBook: $29.99
Formats: PDF, PacktLib, ePub and Mobi formats
$25.49
save 15%!
Print + free eBook + free PacktLib access to the book: $79.98    Print cover: $49.99
$49.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Reviews
Support
Sample Chapters
  • Practical, focused recipes for securing your SQL Server database
  • Master the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, and more
  • A learn-by-example recipe-based approach that focuses on key concepts to provide the foundation to solve real world problems

Book Details

Language : English
Paperback : 322 pages [ 235mm x 191mm ]
Release Date : September 2012
ISBN : 1849685886
ISBN 13 : 9781849685887
Author(s) : Rudi Bruchez
Topics and Technologies : All Books, Enterprise Products and Platforms, Cookbooks, Enterprise, Microsoft SQL Server

Table of Contents

Preface
Chapter 1: Securing Your Server and Network
Chapter 2: User Authentication, Authorization, and Security
Chapter 3: Protecting the Data
Chapter 4: Code and Data Encryption
Chapter 5: Fighting Attacks and Injection
Chapter 6: Securing Tools and High Availability
Chapter 7: Auditing
Chapter 8: Securing Business Intelligence
Index
  • Chapter 1: Securing Your Server and Network
    • Introduction
    • Choosing an account for running SQL Server
    • Managing service SIDs
    • Using a managed service account
    • Using a virtual service account
    • Encrypting the session with SSL
    • Configuring a firewall for SQL Server access
    • Disabling SQL Server Browser
    • Stopping unused services
    • Using Kerberos for authentication
    • Using extended protection to prevent authentication relay attacks
    • Using transparent database encryption
    • Securing linked server access
    • Configuring endpoint security
    • Limiting functionalities – xp_cmdshell and OPENROWSET
    • Chapter 2: User Authentication, Authorization, and Security
      • Introduction
      • Choosing between Windows and SQL authentication
      • Creating logins
      • Protecting your server against brute-force attacks
      • Limiting administrative permissions of the SA account
      • Using fixed server roles
      • Giving granular server privileges
      • Creating and using user-defined server roles
      • Creating database users and mapping them to logins
      • Preventing logins and users to see metadata
      • Creating a contained database
      • Correcting user to login mapping errors on restored databases
      • Chapter 3: Protecting the Data
        • Introduction
        • Understanding permissions
        • Assigning column-level permissions
        • Creating and using database roles
        • Creating and using application roles
        • Using schemas for security
        • Managing object ownership
        • Protecting data through views and stored procedures
        • Configuring cross-database security
        • Managing execution-plan visibility
        • Using EXECUTE AS to change the user context
        • Chapter 4: Code and Data Encryption
          • Introduction
          • Using service and database master keys
          • Creating and using symmetric encryption keys
          • Creating and using asymmetric keys
          • Creating and using certificates
          • Encrypting data with symmetric keys
          • Encrypting data with asymmetric keys and certificates
          • Creating and storing hash values
          • Signing your data
          • Authenticating stored procedure by signature
          • Using module signatures to replace cross-database ownership chaining
          • Encrypting SQL code objects
          • Chapter 5: Fighting Attacks and Injection
            • Introduction
            • Defining Code Access Security for .NET modules
            • Protecting SQL Server against Denial of Service
            • Protecting SQL Server against SQL injection
            • Securing dynamic SQL from injections
            • Using a SQL firewall or Web Application Firewall
            • Chapter 6: Securing Tools and High Availability
              • Introduction
              • Choosing the right account for SQL Agent
              • Allowing users to create and run their own SQL Agent jobs
              • Creating SQL Agent proxies
              • Setting up transport security for Service Broker
              • Setting up dialog security for Service Broker
              • Securing replication
              • Securing SQL Server Database Mirroring and AlwaysOn
              • Chapter 7: Auditing
                • Introduction
                • Using the profiler to audit SQL Server access
                • Using DML trigger for auditing data modification
                • Using DDL triggers for auditing structure modification
                • Configuring SQL Server auditing
                • Auditing and tracing user-configurable events
                • Configuring and using Common Criteria Compliance
                • Using System Center Advisor to analyze your instances
                • Using the SQL Server Best Practice Analyzer
                • Using Policy Based Management
                • Chapter 8: Securing Business Intelligence
                  • Introduction
                  • Configuring Analysis Services access
                  • Managing Analysis Services HTTP client authentication
                  • Securing Analysis Services access to SQL Server
                  • Using Role-Based Security in Analysis Services
                  • Securing Reporting Services Server
                  • Managing permissions in Reporting Services with roles
                  • Defining access to data sources in reporting services
                  • Managing Integration Services password encryption

                  Rudi Bruchez

                  Rudi Bruchez is an Independent Consultant and Trainer based in Paris, France. He has 15 years of experience with SQL Server. He has worked as a DBA for CNET Channel, a subsidiary of CNET, at the Mediterranean Shipping Company (MSC) headquarters in Geneva and at Promovacances, an online travel company in Paris. Since 2006, he has been providing consulting and audits as well as SQL Server training. As SQL Server is evolving into a more complex solution, he tries to make sure that developers and administrators keep mastering the fundamentals of the relational database and the SQL language. He has co-authored one of the best-selling books about the SQL language in French, which was published in 2008 and is the only French book about SQL Server optimization. He can be contacted at http://www.babaluga.com/.

                  Code Downloads

                  Download the code and support files for this book.


                  Submit Errata

                  Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.

                  Sample chapters

                  You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

                  Frequently bought together

                  Microsoft SQL Server 2012 Security Cookbook +    SQL Server 2012 with PowerShell V3 Cookbook =
                  50% Off
                  the second eBook
                  Price for both: $45.60

                  Buy both these recommended eBooks together and get 50% off the cheapest eBook.

                  What you will learn from this book

                  • Start securing your database right from the first step when you install it
                  • Protect your database against brute force attacks, denial-of-service attacks, and SQL Injection
                  • Secure SQL Server Analysis Services (SSAS) and Reporting Services (SSRS)
                  • Use a SQL or Web Application Firewall
                  • Perform user authentication and authorization
                  • Manage object ownership and protect data through views and stored procedures
                  • Create and use certificates, and symmetric and asymmetric encryption keys
                  • Authenticate stored procedures by signatures
                  • Monitor SQL Server logs and use DML and DDL trigger for auditing
                  • Configure SQL Server database audit and manage audit resilience after a crash

                  In Detail

                  In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single SQL injection attack. In these days of high-profile hacking, SQL Server 2012 database security has become of prime importance.

                  "Microsoft SQL Server 2012 Security Cookbook" will show you how to secure your database using cutting-edge methods and protect it from hackers and other security threats. You will learn the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more.

                  We will start with securing SQL Server right from the point where you install it. You will learn to secure your server and network with recipes such as managing service SIDs, configuring a firewall for SQL Server access, and encrypting the session by SSL. We will then address internal security : creating logins to connect to SQL Server, and users to gain access to a database. We will also see how to grant privileges to securable objects on the server or inside the database.

                  After having managed authentication through logins and users, we will assign privileges inside a database using permissions. We will then learn about symmetric keys, asymmetric keys and certificates, which can be used to encrypt data or sign data and modules with a choice of cipher algorithms, as well as creating hash representations of data.

                  Then we will cover methods to protect your database against brute force attacks, denial-of-service attacks, and SQL Injection. Finally we will learn about auditing and compliance and securing SQL Server Analysis Services (SSAS) and Reporting Services (SSRS).

                  Approach

                  Each recipe comprises step-by-step instructions followed by an analysis of what was done in each task and other useful information. The book is designed so that you can read it chapter by chapter, or look at the list of recipes and refer to them in no particular order. Each example comes with its expected output to make your learning even easier thus enabling you to successfully secure your SQL Server 2012 database.

                  Who this book is for

                  This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more.

                  Working knowledge of SQL Server is expected.

                  Code Download and Errata
                  Packt Anytime, Anywhere
                  Register Books
                  Print Upgrades
                  eBook Downloads
                  Video Support
                  Contact Us
                  Awards Voting Nominations Previous Winners
                  Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
                  Resources
                  Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software