As database administrator, there are many actions you can take to improve the security of your data. For example, you can:
Choose passwords carefully Never deploy databases that use the default user ID and password. See Password security.
Restrict DBA authority Restrict DBA authority only to users who absolutely require it since it is very powerful. Users with DBA authority can see and do anything in the database.
Consider giving your database administrators two user IDs: one with DBA authority and one without, so they can connect as a user with DBA authority only when necessary.
Use secured database features The database server -sf option lets you enable and disable features for all databases running on a database server. The features you can disable include the use of external stored procedures, Java, remote data access, and the ability to change the request log settings. See -sf dbeng12/dbsrv12 server option and Secured features.
Drop external system functions The following external functions present possible security risks:
The xp_cmdshell procedure allows users to execute operating system commands or programs.
The email commands allow users to have the database server send email composed by the user. Malicious users could use either the email or use the command shell procedures to perform operating-system tasks with authorities other than those they have been given by the operating system. In a security-conscious environment, you should drop these functions.
For information about dropping procedures, see DROP PROCEDURE statement.
Protect your database files You should protect the database file, log files, and dbspace files from unauthorized access. Do not store them within a shared directory or volume.
Protect your database software You should protect your SQL Anywhere software from unauthorized access. Only give users access to the applications, DLLs, and other resources they require.
Run the database server as a service or a daemon To prevent unauthorized users from shutting down or gaining access to the database or log files, run the database server as a Windows service. On Unix, running the server as a daemon serves a similar purpose. See Running the database server outside the current session.
Set SATMP environment variable to a unique directory (Unix) To make the database server secure on Unix platforms, set SATMP to a unique directory, and make the directory read, write, and execute protected against all other users. Doing so forces all other connections to use TCP/IP, which is more secure than the shared memory connection.
The shared memory buffers that are used between the client and server are removed from the directory tree before any actual data is sent between the two sides. This means that another process cannot see any of the communication data because the shared memory buffer/file is hidden, and so a process cannot get a handle to it. See SATMP environment variable.
Strongly encrypt your database Strongly encrypting your database makes it completely inaccessible without the key. You cannot open the database, or view the database or transaction log files using any other means.
For more information, see -ep dbeng12/dbsrv12 server option and -ek dbeng12/dbsrv12 database option.
Discuss this page in DocCommentXchange.
|
Copyright © 2012, iAnywhere Solutions, Inc. - SQL Anywhere 12.0.1 |