You can secure your data, logs and backup with TDE in Evaluation, Developer, Enterprise and Datacenter versions of SQL Server 2008, 2008 R. Use Transparent Data Encryption whenever it is an option.Read Below tip to learn how to protect your SQL Server Backup folder. Restrict the access to the SQL Server backup folders.Apart from the database level access, you should also protect the file system to prevent unauthorized file deletion, copying or alteration of data. Restrict the access to the SQL Server configuration and database file.If you use fully qualified connection strings then you can disable the SQL Server Browser. This will prevent advertisement of your server by the SQL Server Browser service. You can configure the SQL Server instance as hidden using the SQL Server Configuration Manager. Hide the SQL Server instance and/or turn off the SQL Server Browser Service. You can change the port in SQL Server Configuration Manager. You can avoid some targeted SQL attacks if you do not use the default ports. The SQL Server gets installed with the default TCP port 1433 which is well known by admins and attackers too. You should use the bare minimum of these protocols and disable the others using the SQL Server Configuration Manager. SQL Server supports four type of protocols: Shared Memory, Named Pipes, TCP/IP and VIA.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |