Page 529 - StudyBook.pdf
P. 529

513    Chapter 8 • Infrastructure Security: System Hardening

                 Other vulnerabilities require attention when setting up specific versions of SQL
             in a network. For example, Microsoft’s SQL 7.0 and earlier versions set two default
             conditions that must be hardened in the enterprise environment. First, the “sa”
             account, which is used for security associations and communication with the SQL
             processes, and the host machine, is installed with a blank password. Second, the
             server is configured using mixed mode authentication, which allows the creation of
             SQL-specific accounts for access that are not required to be authenticated by the
             Windows authentication subsystem.This can lead to serious compromise issues and
             allow control of the server or enterprise data. It is strongly recommended that
             administrators harden these two conditions, using a strong password on the sa
             account, and utilizing Windows authentication instead of mixed-mode authentica-
             tion.
                 Network access concerns must also be addressed when hardening the database
             server. SQL, for example, requires that ports be accessible via the network
             depending on what platform is in use. Oracle may use ports 1521, 1522, 1525, or
             1529, among others. MS SQL server uses ports 1433 and 1444 for communication.
             As can be seen, more consideration of network access is required when using
             database servers. Normal OS concerns must also be addressed.
                 SQL server security takes an ongoing and constant effort to try to protect
             databases and their content.An excellent discussion of the SQL server security
             model by Vyas Kondreddi can be viewed at www.sql-server-
             performance.com/vk_sql_security.asp.



              TEST DAY TIP

                  Spend a few minutes reviewing port and protocol numbers for standard
                  services provided in the network environment. This will help when you
                  are analyzing questions that require configuration of ACL lists and
                  determinations of appropriate blocks to install to secure a network.



















          www.syngress.com
   524   525   526   527   528   529   530   531   532   533   534