Chapter 19

Security Best Practices

TOPICS COVERED IN THIS CHAPTER:

  • Establishing Baselines
  • Implementing Least Privilege
  • Auditing SQL Server Activity
  • Configuring the Surface Area
  • Understanding Common Criteria and C2

image As you saw in Chapter 17, "Security Threats and Principles," and Chapter 18, "Authentication and Encryption," securing any technology is more complex than many people think it is. You know that authentication and encryption are important components of SQL Server security, but security doesn't stop with them. The process includes more than just the technical steps required to turn off a feature or configure a security solution. Security ...

Get SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.