As a database administrator, You can take many measures to improve data security. For example, you can:
• Change the default user ID and password. The default user ID of the newly created database is DBA and the password is SQL. The password should be changed before the database is deployed.
• Requires a long password. You can set the MIN_PASSWORD_LENGTH public option to not allow short passwords (because it is easy to guess ).
• Restrict DBA authorization because the DBA permission is very powerful, so it should be limited to users who actually need this permission. Users with DBA permissions can view everything in the database and perform all operations.
You may consider granting two user IDs with DBA permissions: one with DBA permission and the other without DBA permission, in this way, they can connect as a DBA only when necessary.
• Security risks may occur when you delete the following external functions:
Xp_cmdshell, xp_startmail, xp_startsmtp, xp_sendmail,
Xp_stopmail and xp_stopsmtp.
The xp_cmdshell process allows you to execute operating system commands or programs.
By using the email command, the user can ask the server to send emails written by the user. Malicious users can use the email or command interpreter process to execute operating system tasks beyond the permissions granted to them by the operating system. Delete these functions in a secure environment.
• Protecting database files should protect database files, log files, dbspace files, and write files from unauthorized access. Do not store them in a shared directory or volume.
• Protect your database software, and you should also protect your Adaptive Server Anywhere software. Only give users access to applications, DLL and other resources they require.
· Run the database server as a service or background process. To prevent unauthorized users from shutting down the database or obtaining access to the database or log files, the database server should be run as a Windows service. On UNIX, running the server as a background process plays a similar role.
· Set ASTMP to a unique directory to protect the security of the engine on UNIX platforms. Set ASTMP to a unique directory, it also prevents all other users from reading, writing, and performing operations on the directory. This will force all connections to use TCP/IP, and using TCP/IP is more secure than the shared memory connection.
· The database is highly encrypted so that it cannot be accessed without using a key. You cannot use any other method to open a database or view a database or transaction log file.