Database Storage Flashcards

1
Q

What is Database Security?

A

keeping databases secure because the management of massive amounts of data in databases makes them a prime target for cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best Practice: Database Servers and Web Servers

A

This means keeping databases servers in a secure, locked, keeping unauthorised people out.

Also means keeping database on a separate physical machine as a web server is more likely to be attacked since it is located in a buffer (demilitarised zone) - publicly accessible.

If a web server is compromised and a database runs on the same machine, the attacker has access to the database and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Best Practice: Web Application and Database Firewalls

A

A database server should be protected from security threats by a firewall which denies access to traffic. The only allowed traffic should be specific applications or web servers.

Firewall should also protect database from initiating outbound connections unless needed to do so.

Web application firewall can be deployed as well to protect against SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would a database firewall not prevent SQL injection attacks?

A

Because if the SQL injection attack comes from an application that is an allowed source of traffic, the firewall would not stop the requests and data could be withdrawn/deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best Practice: Secure Database User Access

A

The least number of people possible should have access. Admins should only have the bare minimum privileges and only during periods where they need access.

In larger organisations, automatic access management should be considered, providing users with a temp password with privileges they require each time. It also logs activities carried out and prevents password sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best Practice: Updating OS and Patches

A

Very important to keep all OS and software up to date to protect against recent vulnerabilities. Particularly important for databases with a large number of third-party applications that each require their own updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best Practice: Audit and Monitor Activity

A

Logging logins, attempted logins, reviewing logs regularly. Alerts to notify personnel when malicious activity is identified.

DAM software can help with this functionality - spot compromised accounts, when users are carrying out suspicious activity or when a DB is under attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Best Practice: Encrypt Data and Backups

A

Encrypt data both stored and in-transit. A database should be backed up with any backups encrypted and stored separately. Protects against hackers and also problems with physical hardware/damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Best Practice: Avoid Default Ports

A

When setting up Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), they automatically use default network ports. Default ports are often seen in brute force attacks due to their common occurrence. Attackers must use trial and error when default ports are avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly