Click here to monitor SSC
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Databases – Infrastructure – Security

Brian Kelley is an author, columnist, and Microsoft SQL Server MVP focusing primarily on SQL Server security. He is a contributing author for How to Cheat at Securing SQL Server 2005 (Syngress), Professional SQL Server 2008 Administration (Wrox), and Introduction to SQL Server (Texas Publishing). Brian currently serves as an infrastructure and security architect. He has also served as a senior Microsoft SQL Server DBA, database architect, developer, and incident response team lead.

Reminder: Webinar today

This is a reminder that I’ll be giving a webinar today on managing SQL Server Agents jobs in a SQL Server Farm. Here are the details:

Webinar: Managing SQL Server Agent Jobs Across Your SQL Server Farm

On Thursday, September 8, at 3 PM EDT, I’ll be doing a webinar… Read more

0 comments, 111 reads

Posted in Databases – Infrastructure – Security on 8 September 2016

Reminder: #SQLChat at lunch today

This is a reminder that we’ll having a #SQLChat this afternoon at 12 PM EDT. Here are the details:

SQLChat: Do You Manage Multiple Servers?

On Wednesday, September 7, at 12 PM EDT (11AM CDT), we’ll be doing a #SQLChat covering managing multiple SQL Servers and how people handle dealing… Read more

0 comments, 179 reads

Posted in Databases – Infrastructure – Security on 7 September 2016

SQLChat on Wednesday, Webinar on Thursday!

I’m participating in two community activities this week. One is a #SQLCchat on Twitter and the other is a webinar through MSSQLTips.

SQLChat: Do You Manage Multiple Servers?

On Wednesday, September 7, at 12 PM EDT (11AM CDT), we’ll be doing a #SQLChat covering managing multiple SQL Servers and how… Read more

0 comments, 98 reads

Posted in Databases – Infrastructure – Security on 6 September 2016

I wrote a SQL Server auditing whitepaper!

I recently collaborated with Idera to produce a short whitepaper on the top 5 things to audit in SQL Server (database engine). You can grab it for free here (registration required):

Whitepaper: Top 5 Items to Audit in SQL Server

None of this is earth shattering. The whitepaper contains the… Read more

0 comments, 224 reads

Posted in Databases – Infrastructure – Security on 27 July 2016

Not More Than 16 Characters?!?

Microsoft, you’re killing me. This is the warning I received when typing in a password for Office 365:

I blinked when I saw the warning, “Your password can’t be longer than 16 characters.” I couldn’t believe that I had gotten that warning, so I erased what I had typed for… Read more

7 comments, 2,443 reads

Posted in Databases – Infrastructure – Security on 10 June 2016

Protecting Against Delete without Where

If I’m doing any manual work with T-SQL, I always begin every set of data change operations with BEGIN TRAN and I have the COMMIT TRAN commented out at the end of my script. Why?

Quite simply, because I’m wary of having a DELETE clause without a proper WHERE clause.… Read more

7 comments, 3,295 reads

Posted in Databases – Infrastructure – Security on 9 June 2016

A Different Type of Currency

Recently, a member of the community lamented that folks weren’t willing to provide an email address for free training. This reminds me of an old saying popularized by Heinlein, but one that was used a lot in the Perl community: TANSTAAFL (There Ain’t No Such Thing As A Free Lunch).… Read more

1 comments, 198 reads

Posted in Databases – Infrastructure – Security on 9 June 2016

Slides from 2016 Techno Security & Mobile Forensics Conference

I’ve completed both of my presentations at the 2016 Techno Security and Forensics Investigation Conference (#technosecurity). If you were able to make it to one of my talks, thank you for choosing to spend your time with me. While my slides will be available from the conference site,… Read more

0 comments, 203 reads

Posted in Databases – Infrastructure – Security on 7 June 2016

Sights that just scream, “No!”

I’m at a conference, specifically a security conference. So I looked at the available WiFi connections. Among the conference and hotel specific connections and the MiFi and cellphone uplinks I spotted this one:

That just screams, “No!” TANSTAAFL.


Read more

0 comments, 211 reads

Posted in Databases – Infrastructure – Security on 7 June 2016

Congrats to MSSQLTips on 10 Years!

MSSQLTips has posted about their 10 years as a resource to the SQL Server community. It’s where I do the bulk of my writing these days, mainly because I like the problem/solution format. However, the folks at MSSQLTips didn’t just write to acknowledge their 10th birthday. 

They also posted… Read more

0 comments, 197 reads

Posted in Databases – Infrastructure – Security on 6 June 2016

On Software and OS Lifecycle Management

An Important Rule: 

If you’re trying to convince someone to your viewpoint, insulting them generally doesn’t work. If it does anything, it will be more likely to entrench them against your position. Therefore, this is something that IT professionals should avoid. 

If You Write Your Own Software

or work… Read more

0 comments, 4,821 reads

Posted in Databases – Infrastructure – Security on 17 April 2015

On Software and OS Lifecycle Management

An Important Rule: 

If you’re trying to convince someone to your viewpoint, insulting them generally doesn’t work. If it does anything, it will be more likely to entrench them against your position. Therefore, this is something that IT professionals should avoid. 

If You Write Your Own Software

or work… Read more

0 comments, 87 reads

Posted in Databases – Infrastructure – Security on 17 April 2015

On PowerShell

I use PowerShell a lot and I write about using it to solve problems quite frequently. The fact that I can extending Powershell by interfacing with the .NET Framework or making a COM/COM+ object call means I can do just about anything I need to do in order to… Read more

0 comments, 162 reads

Posted in Databases – Infrastructure – Security on 10 April 2015

On PowerShell

I use PowerShell a lot and I write about using it to solve problems quite frequently. The fact that I can extending Powershell by interfacing with the .NET Framework or making a COM/COM+ object call means I can do just about anything I need to do in order to… Read more

0 comments, 415 reads

Posted in Databases – Infrastructure – Security on 10 April 2015

On Automation

I’m a big fan of automation. I’ve been in IT for 27 years now. One unchanging rule during that time is there is always more to do than there is time to do it. Automation helps close that gap. And when I can automate something, I can do more than… Read more

0 comments, 4,853 reads

Posted in Databases – Infrastructure – Security on 9 April 2015

On Automation

I’m a big fan of automation. I’ve been in IT for 27 years now. One unchanging rule during that time is there is always more to do than there is time to do it. Automation helps close that gap. And when I can automate something, I can do more than… Read more

0 comments, 105 reads

Posted in Databases – Infrastructure – Security on 9 April 2015

Trust No One Implicitly

At the Charlotte BI Group meeting last night, one of the questions I was asked after I gave my talk on Securing the ETL Pipeline was this:

“So you’re basically saying we should trust our DBAs?”

My response caught several people off guard:

“No, I’m saying to trust no one

Read more

2 comments, 86 reads

Posted in Databases – Infrastructure – Security on 8 April 2015

Trust No One Implicitly

At the Charlotte BI Group meeting last night, one of the questions I was asked after I gave my talk on Securing the ETL Pipeline was this:

“So you’re basically saying we should trust our DBAs?”

My response caught several people off guard:

“No, I’m saying to trust no one

Read more

2 comments, 5,214 reads

Posted in Databases – Infrastructure – Security on 8 April 2015

Speaking at Charlotte BI Group Tomorrow

Tomorrow, Tuesday, April 7, 2015, I’ll be speaking at the Charlotte BI user group. The meeting starts at 5:30 PM.

Here’s the info:

RSVP Link

Topic: Securing the ETL Pipeline

We’re going to look at typical ETL (Extract, Transform, Load) pipelines and consider the weak points an attacker might… Read more

0 comments, 229 reads

Posted in Databases – Infrastructure – Security on 6 April 2015

Speaking at Charlotte BI Group Tomorrow

Tomorrow, Tuesday, April 7, 2015, I’ll be speaking at the Charlotte BI user group. The meeting starts at 5:30 PM.

Here’s the info:

RSVP Link

Topic: Securing the ETL Pipeline

We’re going to look at typical ETL (Extract, Transform, Load) pipelines and consider the weak points an attacker might… Read more

0 comments, 76 reads

Posted in Databases – Infrastructure – Security on 6 April 2015

Older posts