Infrastructure at your Service

Tag

Security Archives - Blog dbi services

David Barbarin

Using non-root SQL Server containers on Docker and K8s

By | Database Administration & Monitoring, DevOps, Docker, Kubernetes, SQL Server | No Comments

This is something that I waited for a while, in fact since SQL Server 2017 … and the news came out on Wednesday 09th September 2019. Running Non-Root SQL Server Containers is now possible either on the next version of SQL Server (2019) and it has been backported on SQL Server 2017 as well. Non-root SQL Server containers will likely be part of hidden gem of SQL Server new features, but this is definitely a…

Read More
Dominique Althuser

Email Spoofing

By | Security | No Comments

Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone, has the gift of throwing us the opprobrium? This is the purpose of this particular kind of sextortion mail that uses spoofing, to try to extort money from you. A message from a supposed “hacker” who claims to have hacked…

Read More
Nathan Courtine

Transparent Data Encryption – Certificate in master database: is it really a good practice?

By | Database Administration & Monitoring | 5 Comments

As encryption solution in SQL Server, Transparent Data Encryption (TDE) is simple and quick to set up. That’s why this is a common encryption mechanism. TDE encrypts data with a certificate at the page level, before SQL Server writes on the disk. It is supposed to protect your environment from some scenarios, where SQL Server files (backups or data) are stolen. By default the certificate used for encryption is stored in the master database. But…

Read More
Stéphane Haby

SQL server security pre-conference @SQL Pass Summit 2018 in Seattle

By | Database Administration & Monitoring, SQL Server, Technology Survey | No Comments

After long hours of flights, Christophe Cosme and I finally arrived in Seattle at the SQL PASS Summit 2018. We picked up our badge and bag and now we are ready to begin… This first day for me started with the pre-conference about SQL Server Security with Denny Cherry. Many topics were discussed like: Network Designs (such as public IP vs. Private IP) Firewall configurations (such as Network Design between Public network, Internal network and…

Read More
Stéphane Haby

SQL Server Tips: Drop a database-user attached to a service…

By | Database Administration & Monitoring, Database management, SQL Server | No Comments

Few weeks ago, I have a little issue when I try to drop a database-user without login Unfortunately, I do a little mistake at the beginning… I receive like every morning a report if all AD logins (computers, groups, users) registered on SQL server instances are in the AD with the useful command sp_validatelogins This report indicates that a computer name dbi\server_name$ was no more in the AD. I drop the login without problem and…

Read More
Stéphane Haby

SQL Server Security: Are your databases ready for the GDPR?

By | Database Administration & Monitoring, SQL Server, Technology Survey | No Comments

The GDRP (General Data Protection Regulation), voted in 2016, will be applied in the European Union soon (May 25, 2018). We heard a lot of this new directive. The goal is to improve the protection and confidentiality of personally identifiable information for every European citizen. Quid of Switzerland? Read the article of Gregory here. A personal data is information that identifies a natural person, directly or indirectly. It can be a name, a photograph, an…

Read More
Oracle Team

Keep your orapw password file secure

By | Oracle | 2 Comments

By Franck Pachot . This is a small demo I did when I’ve found a database password file (orapw) lying around in /tmp with -rw-rw-rw- permissions, to show how this is a bad idea. People think that the orapw file only contains hashes to validate a password given, and forget that it can be used to connect to a remote database without password.

Read More
Stéphane Savorgnano

Pass Summit 2017: how to bypass SQL Server security

By | Database Administration & Monitoring | No Comments

Last Friday I saw a very interesting session in Pass Summit 2017 about how to Bypass, or Ensure, SQL Server security by Matt Martin. Matt explained us how to bypass SQL Server security with the complicity of your SQL Server DBA. Msdb is the most powerful database to get stuff done: mail, jobs… so let’s have a look how to take the power within a SQL Server instance. Start a job under SQLAgentOperator role SQLAgentOperator…

Read More
Nathan Courtine

PASS SUMMIT 2017 – SQL Server Security

By | Database Administration & Monitoring | No Comments

Today is the first day of the PASS SUMMIT 2017 in Seattle (WA). The weather is cloudy and we have only 11°C… but where is the problem? Everything happens inside! (at the Convention Center). In this blog, I will make a summary of main attack vectors against MSSQL environments, based on Argenis FERANDEZ’s session called “Modern Security Attack Vectors Against SQL Server Environments”. METASPLOIT Metasploit is a penetration testing framework to exploit known security vulnerabilities….

Read More