Summary

In this chapter, we went over some basic procedures for securing a MySQL database server. Although you may not be a MySQL administrator yourself, as the PHP developer you're probably the defacto administrator in many situations.

To successfully secure your database, you need to think about creating users in a smart, consistent way: always require a username and password, revoke unnecessary privileges, and put the proper permissions on configuration files. From the server perspective, always run as an unprivileged user, provide regular backups, and grant privileges in a conservative manner.

Get Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.