Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 856    Older >>
 

Signing options

By Steve Jones 2015/02/20 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,307 reads

Not Again!

By Steve Knox 2015/02/18 | Category: aggregates
Rating: (not yet rated) |  Discuss |   Briefcase | 1,903 reads

SQL Injection, Still?

We still have problems with SQL Injection. Steve Jones has a few thoughts on why.  Read more...
By Steve Jones 2015/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 178 reads

Master Key creation

By Steve Jones 2015/02/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,255 reads

Signing Procedures

By Steve Jones 2015/02/09 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,426 reads

Login options

By Steve Jones 2015/02/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,661 reads

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.  Read more...
By Don Kiely 2015/02/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,007 reads

Users , Roles and Logins

Useful script in cases where auditors would like to know roles for each user in each database of an instance as well as the status of associated logins.  Read more...
By Kenneth Igiri 2015/02/03 | Source: SQLServerCentral.com | Category: auditing
Rating: |  Discuss |   Briefcase | 1,620 reads

Alter database owner to SA from any user details on all user databases

Alter database owner to SA from any other user details against all user databases  Read more...
Rating: |  Discuss |   Briefcase | 1,053 reads

Database ownership and TRUSTWORTHY

Database ownership is an old topic for SQL Server pro's. Check this simple lab to learn the risks your databases can be exposed to.  Read more...
By Raul Gonzalez 2015/01/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,203 reads

Data Mining Part 23: Security

In this chapter we will talk about security recommendations for SQL Server Data Mining.  Read more...
By Daniel Calbimonte 2015/01/27 | Source: SQLServerCentral.com | Category: roles
Rating: |  Discuss |   Briefcase | 1,802 reads

Find Deny permissions on database objects

This script allows the DBA to quickly determine if a deny statement is stopping a user from accessing db objects.  Read more...
Rating: |  Discuss |   Briefcase | 655 reads

Verify Login SID and Machine SID

This script is to verify which login accounts have SID values that don’t match the correct SID values defined on the machine or in the domain.  Read more...
Rating: |  Discuss |   Briefcase | 1,095 reads

SQL Server PCI DSS Security Patching Checklist

PCI DSS has strict requirements about implementing security updates and using only applications which are supported by the vendors. How do you create a patching policy for SQL Servers?  Read more...
By Additional Articles 2015/01/12 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,145 reads

What counts for a DBA: Responsibility

Whose fault is it if a database is hacked and its contents appear on a hacker’s site? Louis Davidson suggests that, regardless of limitations, the DBA always bears some responsibility.  Read more...
By Louis Davidson (@drsql) 2014/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 119 reads

Investigate Report Server Security

List the role that every user have on the directories  Read more...
By Leonardo Campos 2014/12/15 | Source: SQLServerCentral.com | Category: report server
Rating: |  Discuss |   Briefcase | 724 reads

It's Not Just Poor Coding

It's not just poor coding that threatens security, as a new survey shows.  Read more...
By Steve Jones 2014/11/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 225 reads

Database Master Keys

By Steve Jones 2014/11/13 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,778 reads

Backup Keys

By Steve Jones 2014/11/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,434 reads

Permissions

By Steve Jones 2014/11/07 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,664 reads
   Items 1 to 20 of 856    Older >>
 
Tags
editorial (123)    
sql server 7 (105)    
administration (68)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (37)    
t-sql (33)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (22)    
permissions (22)    
miscellaneous (15)    
sql server 2008 (14)    
logins (13)    
passwords (13)    
backup / restore (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
roles (10)    
sql injection (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
software development (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
sql server 2008 r2 (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schemas (4)    
server roles (4)    
sql server 2000 (4)    
stairway series (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
sid (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
ddl (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
revert (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)