15.Securing Your MySQL Installation

In this chapter we'll discuss general security issues you should consider when running MySQL. Although we cannot be comprehensive in the space of a single chapter, we will give you a list of the most important don'ts. We will cover the following:

• How the privilege system works in practice

• Securing accounts

• Securing your installation files

• Filtering user data

• Other tips

How the Privilege System Works in Practice

In Chapter 11, “Managing User Privileges,” we discussed user account creation, granting and revoking privileges, and the grant tables. We will begin this chapter by discussing how your MySQL server applies the privileges you have granted.

There are two stages to the privilege ...

Get MySQL Tutorial now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.