SQL Server R2 Security topic (i): Security principles

Source: Internet
Author: User
Tags least privilege
Original: SQL Server R2 Security Topic (i): Security principles

This series is mainly focused on SQL Server 2005 after the DBMS, because I work with the R2, so now for the R2 to explain:

On the principle of protecting SQL Server security:

  • Principle of least privilege
  • CIA Triangle
  • Deep protection
First, the principle of least privilege:

Grant only the minimum permissions that are required.

The simplest solution is to make the user an intrinsic database role: The db_datareader member, then create a SELECT permission to create a database role, and only authorize the tables that the user needs to access, making the user a member of the new role. Remote connections are not enabled on some machines.

Ii. CIA triangle: confidentiality, completeness, availability

Confidentiality: Unauthorized persons or the use of unauthorized methods do not have access to data.

Integrity: Unauthorized people or unauthorized methods cannot modify the data.

Availability: Authorized people can use the data at any time .

The above three kinds of characteristics are indispensable, and to maintain a reasonable balance state. Which side is too tight, will lead to imbalance.

Third, in-depth protection:

Build multiple layers of protection to avoid receiving attacks.

  • External routers outside the perimeter.
  • Perimeter of the firewall.
  • PC comes with a personal firewall.
  • Anti-virus software running on your PC.
  • Patch management methods and development software.
Guarantee this 5-layer defense. Can reduce the chance of being attacked. If there is a disaster, then the PC will be the victim of the attack.


SQL Server R2 Security topic (i): Security principles

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.