Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Locking Down SQL Server 2000

    Written by

    Jim Rapoza
    Published January 12, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      While the Blaster worm and Sobig virus garnered the lions share of attention and fear last year, 2003 began with a worm that caused many headaches for administrators of Microsoft Corp.s SQL Server 2000. The SQL Slammer worm, which exploited a known and patched hole in SQL Server 2000, crashed servers and brought networks to their knees.

      In multiple tests held recently at eWEEK Labs, an unpatched SQL Server system became infected with SQL Slammer in less than 10 minutes. However (and amazingly), a year after SQL Slammer first struck, there are still many vulnerable and unpatched SQL Server systems on the Internet.

      Securing SQL Server

      • Stay up-to-date with service packs
      • Quarantine new or unpatched SQL Server systems until theyre secured
      • Perform offline testing of patches
      • Use a strong, regularly changed sa password and, if applications permit, Windows authentication
      • Block the ports on which SQL Server listens for connections
      • Make use of vulnerability assessment and patch management tools
      • Make sure applications that attach to SQL Server are secure
      • Check multiple resources for SQL Server information

      Clearly, there are many people who havent gotten the message when it comes to patching and securing SQL Server 2000.

      Compounding the trouble is the fact that MSDE 2000 (Microsoft SQL Server 2000 Desktop Engine) is also vulnerable to SQL Slammer and is often installed as part of third-party applications.

      There is no reason for this problem to be as bad as it still is. While it takes vigilance to stay aware of your potential danger spots and to know where all your SQL Server and MSDE implementations are, securing SQL Server itself isnt rocket science.

      Next page: Steps you can take to lock down SQL Server

      Steps you can take

      to lock down SQL Server”>

      The first and most obvious step in security for SQL Server is to stay up-to-date with the service packs for SQL Server 2000. All the most recent packs include fixes for the problems that cause SQL Slammer, as well as for other potential security problems.

      In addition, we recommend that when dealing with a new or unpatched SQL Server system, IT managers take that system offline or put it on a closed network. Given how quickly Slammer can strike, any IT staff is bound to end up with an infected system while patching a new system.

      This will also provide an opportunity to do offline testing of the patch to ensure it doesnt adversely affect your applications.

      Outside of SQL Slammer, a poorly secured SQL Server implementation can make it easy for malicious attackers to crack applications and databases and access sensitive information. One of the most common mistakes is poor or nonexistent authorization security. Weve been stunned the numerous times weve seen a SQL Server system with a blank sa (system administrator) password. We recommend using a strong, regularly changed sa password and, if applications permit, using Windows authentication.

      Another common-sense step to take in securing SQL Server is to block the ports on which it listens for connections—namely, TCP port 1433 and User Datagram Protocol port 1434. If the systems that need to connect to SQL Server are the only ones that can connect to it, you will have more protection against unknown problems that may arise.

      Next page: Web resources for SQL Server security

      Web resources for SQL

      Server security”> Of course, practicing good security in general will help a great deal in securing SQL Server. Using vulnerability-checking applications and patch management tools will help IT managers find vulnerable systems, especially embedded MSDE engines.

      In addition, any applications that attach to the SQL Server database must be secure against common holes and exploits. If your applications are full of holes, securing SQL Server wont help.

      Finally, its important to educate yourself about SQL Server. There are excellent books available that go into great detail about configuring and securing SQL Server and Windows server systems.

      Its also a good idea to frequently check Microsoft developer boards on SQL Server, where one can often find information on late-breaking problems as well as advanced tweaks and settings that can make SQL Server deployments more secure.

      Labs Director Jim Rapoza can be reached at [email protected]

      Web resources for SQL Server security

      • SQLSecurity.com Independent site that provides updates and information on securing SQL Server; lots of good information and free tools (www. sqlsecurity.com)
      • 10 Steps to Help Secure SQL Server 2000 Microsoft provides the base-line recommendations that will go a long way toward helping users secure their SQL Server systems (www.microsoft.com/sql/techinfo/ administration/2000/security/securingsqlserver.asp)
      • Microsoft Baseline Security Analyzer Free Microsoft tool for finding unpatched Windows systems and applications on networks ( www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ tools/mbsahome.asp)
      Jim Rapoza
      Jim Rapoza
      Jim Rapoza, Chief Technology Analyst, eWEEK.For nearly fifteen years, Jim Rapoza has evaluated products and technologies in almost every technology category for eWEEK. Mr Rapoza's current technology focus is on all categories of emerging information technology though he continues to focus on core technology areas that include: content management systems, portal applications, Web publishing tools and security. Mr. Rapoza has coordinated several evaluations at enterprise organizations, including USA Today and The Prudential, to measure the capability of products and services under real-world conditions and against real-world criteria. Jim Rapoza's award-winning weekly column, Tech Directions, delves into all areas of technologies and the challenges of managing and deploying technology today.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.