- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
Security, along with performance, is one of the hottest topics of discussion on the SQL Server forums and on the speaking circuit. The difference between the two topics, however, is that most folks take what they learn about performance and apply it to their systems right away. This isn’t always true for security, however.
Why is that? Why don’t we always work on security the way we work on other priorities? There are several reasons I’ve seen mostly involving not knowing where to start, and the amount of time it takes to find and fix security issues. In this tutorial, I’ll show you how to evaluate your systems systematically, and use as many automated tools as possible.
I’ll start with four simple rules you should follow for evaluating and securing your system. The further you go with these rules, the more secure your systems will be.
The four rules for securing your systems are:
- Find the Attack Surfaces
- Follow Best Practices
- Use Automated Tools
- Educate Yourself and Stay Current
Let’s dive in to how to follow these steps. If you complete each one and put it on your regular DBA system-check schedule, you won’t be surprised by a security issue in your environment.
Keep in mind that there is no “silver bullet” that will find and fix your security issues for you. If there was, Microsoft would just implement those for you automatically. The issue is that no one knows what level of security is best for each application. That’s a mix of your software package, the needs of the organization, and the level of security required. So the settings are important for you to set. So I won’t give you a full list of things to take care of or prescribe things you should set. Sorry about that you really do need to understand these settings before you make them. But not to worry. Towards the end of the article I’ll show you some tools that will help. While you’re reading through this tutorial and the articles I’ll reference, you might want to make a checklist for yourself and your organization.
Find the “Attack Surfaces”
To start, you need to understand the security areas for SQL Server that someone can use to attack. I recommend that you start with the “outside-in” approach, although any systematic approach is fine, as long as it covers all these areas and you are consistent in implementing them.
Hardware
The hardware your system runs on is the first level of security you should consider. You need to ensure that only the administrators and other appropriate personnel can access your systems. Recently there was a report that thieves broke into a data center they bypassed computers, rack hardware, and everything else except for the hard drives. What do you think they were after?
Find out where your hardware lives, and who has access to it. That includes the servers, the network connections (including wifi) and the workstations. All of those represent an attack vector. Also ensure that you work with the rest of your IT team on who has access to them, what to do in case of a “lost laptop” (or smartphone) scenario, when those devices include data from your databases. You do know which databases are replication data, correct?
Platform
After you’ve secured access to the physical hardware of your SQL Servers, the next level is to secure the operating system they run on. You can find a list of best practices for that here. Make sure you apply the proper level of service packs, updates and hotfixes for your system. More on that in a moment.
I’m also including the SQL Server software in the Platform area. First, ensure that you carefully evaluate the installation choices when you’re setting up the system. Don’t just take all the defaults, and install everything that opens up far more attack surfaces than you should. Install only what you need. If you’re using features such as SQL Server 2008’s FILESTREAM, it will request a share location to store the “off database” binary data. Make sure that you include that location in your share evaluation on your server to ensure no one has access that shouldn’t. In other words, understand the file locations for SQL Server and check the Access Control Level (ACL’s) for each one. Only administrators and the system accounts that run SQL Server should have access to them, including places such as data file locations and backup folders.
After you’ve completed that check then check the settings for the network and services using the Configuration Manager. Do not use the Services Control Panel applet, since the Configuration Manager tool does more than just start and stop services – it controls service rights, file shares and more, all automatically. I’ve documented that tool here.
From there, open SQL Server Management Studio (SSMS) and check the Server-level configuration options. Again, the levels and so on depend on your situation and security requirements, so check out the options and their security implications here. You should always bias towards choosing the lowest amount of entry possible, and relax that only as needed.
Databases and Objects
Each database in SQL Server also has Properties and settings, just like the Instance of SQL Server. For a discussion of those settings, check out this article. Again, select the “least privilege” approach, opening up only what you need.
Once you’ve secured the database to the desired level, you can move on to the tables, users, stored procedures and so on. There’s quite a list of things to understand at this level, so to figure out SQL Server Database object and statement level permissions, start with my articles here. In many cases software will use a “proxy account,” so called because only one account accesses the database, and the software handles what each user can see or do. You’ll need to understand the software that accesses SQL Server to see where the security needs to be controlled.
Code
The next place to look is to evaluate the code that runs on your system. Writing secure code involves, once again, that concept of “least privilege” I keep bringing up. If it’s a vendor package, ask them about the security features, requirements, and tweaks you are allowed to explore. If it’s code your team writes the code, make sure you check out the book called “Writing secure Code” it’s essential reading for any developer.
One of the most common coding errors for SQL Server is writing the code such that an attacker could “slip in” more code (or less) than you intended to run. This is called “SQL Injection,” and you can read what it is, and how to protect against it here.
Data at Rest and in Transit
The last section of SQL Server that you need to protect is the data itself. This includes the physical, platform, code and other security, but also includes things like encryption, securing and encrypting your backups, and even network encryption. The links show you more about each of these areas.
Follow Best Practices
As you can see, there are a lot of things here to consider but you don’t have to re-invent the wheel. Many organizations, Microsoft included, have created a series of “best practices” that you can follow for common Patterns and Practices around the configuration of your system. While you should review these and possibly even implement some of them, you should understand what they mean. Don’t just enable or disable a setting because you see it listed understand why it’s a best practice.
To understand them, you need to know where they are. The primary source I use for best practices are the Microsoft SQL Server sites on that topic and the SQL Server Customer Advisory Team, or SQLCAT. Here are some links that will help:
- SQL Server Best Practices
- Security Overview for Database Administrators
- SQLCAT site for Security
- Microsoft General Security website
After you understand the best practices, all that’s left is to implement them. This is the part that takes the most planning and discipline. To do that, I start with an automated process, leveraging as many tools as I can.
Use Automated Tools
I’ve given you quite a few articles to read and understand. You may not have time to do that, which brings us around to the beginning of this article. But since you need a secure system, and you don’t always have the time to check the settings, why not have software do the job for you? There are packages, free and pay-for, that will help you do that.
Another important thing to keep in mind is that while these tools can help you with Platform and Database settings, they can’t take care of your physical security, password policies, or poorly-written code. That’s something you’re still going to have to take a look at yourself.
Microsoft Baseline Security Analyzer
A great place to start for an “outside-in” approach is the Microsoft Baseline Security Analyzer. This tool will examine one or more systems to make sure they comply with security best-practices with an operating system focus. It can also be scripted, which is a great benefit. You can find it here: http://technet.microsoft.com/en-us/security/cc184923.aspx
Best Practices Analyzer
By far one of the best tools to catch the most errors in your system configuration, including some security issues, is the SQL Server Best Practices Analyzer. I’ve written a full article on it here, and you can find it on the Microsoft website.
Policy Based Management
In SQL Server 2008, Policy Based Management (PBM) was created to take the place of the Best Practices Analyzer. In fact, Microsoft still has both tools, but there are advantages to using PBM, since you can create your own rules easily and it’s extensible. I’ve written a full set of articles here on PBM.
PowerShell
PowerShell is a scripting environment that works with the .NET environment which means it can “talk” natively to Windows, SQL Server, and other software that runs on the Windows environment. I’ve written an entire series of articles on PowerShell starting here, and you can use it to not only check and change the settings you want, but it will even allow you to script things like the Policies inside Policy Based Management.
Third-party
A few other companies provide tools that will help you perform a security audit. A quick web search on “SQL Server Security Audit” will bring those up. Make sure when you evaluate those tools that they allow you to customize them for your environment, that they cover your editions and versions of SQL Server, and that they have a good track record.
Educate Yourself and Stay Current
No, you don’t want to just apply things blindly make sure you understand what is in each update and apply it only when you need to. You can find a list of security bulletins to subscribe to here.
It’s important to stay on top of your security audits. Make them into a checklist, and roll those steps and these tools into a periodic review. You should check your security at least once a month, or even more often if you have a very dynamic environment.
InformIT Articles and Sample Chapters
There’s a good reference on creating a security policy in the article Developing a Security Policy.
Books and eBooks
It is not a simple matter to develop secure software. The book The Art of Software Security Testing: Identifying Software Security Flaws shows you how.
Online Resources
The security documentation within SQL Server Books Online is well ordered, and is the most authoritative place for information. You can read it starting here.