opass – march 8, 2012

19
OPASS – MARCH 8, 2012 K. Brian Kelley MCSE, CISA, Security+, MVP-SQL Server The Dirty Business of Auditing Auditing SQL Server (2000 – 2008R2)

Upload: chipo

Post on 23-Feb-2016

35 views

Category:

Documents


2 download

DESCRIPTION

The Dirty Business of Auditing. oPASS – March 8, 2012. Auditing SQL Server (2000 – 2008R2). K. Brian Kelley MCSE, CISA, Security+, MVP-SQL Server. My Background. Database Administrator / Architect Infrastructure and security architect Incident response team lead - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: oPASS  – March 8, 2012

OPASS – MARCH 8, 2012

K. Brian KelleyMCSE, CISA, Security+, MVP-SQL Server

The Dirty Business of AuditingAuditing SQL Server (2000 – 2008R2)

Page 2: oPASS  – March 8, 2012

MY BACKGROUND Database Administrator / Architect Infrastructure and security architect Incident response team lead

Certified Information Systems Auditor (CISA)

SQL Server security columnist / blogger

Co-Author of: How to Cheat at Securing SQL Server 2005 (Syngress) Professional SQL Server 2008 Administration (Wrox) Introduction to SQL Server (Texas Publishing)

Page 3: oPASS  – March 8, 2012

CONTACT INFORMATION Mail: [email protected] Twitter: @kbriankelley Blogs:

SQL Server Central http://gkdba.wordpress.com/

Page 4: oPASS  – March 8, 2012

AGENDA FOR TONIGHT Why auditors can’t audit SQL Server: “Tag, you’re

It” SQL Server Surface Area Server Level Auditing Database Level Auditing

Page 5: oPASS  – March 8, 2012

INFORMATION DISCLOSURE ISSUE SQL Server 2000 – Access to DB, you can

audit But so can anyone… Catch-22

SQL Server 2005+, you must have permissions to object.

Recommendation: Automate the auditing. Use service account with proper permissions.

Page 6: oPASS  – March 8, 2012

SURFACE AREA – FROM REMOTE Quest Discovery Wizard SQL Ping MS Assessment and Planning (MAP) tool nmap General scanner – Qualys, Nessus

Page 7: oPASS  – March 8, 2012

SURFACE AREA – ON THE SERVER SQL Server 2000:

SQL Server Server Network Utility

SQL Server 2005 only: SQL Server Surface Area Configuration

SQL Server 2005 and above: SQL Server Configuration Manager

Page 8: oPASS  – March 8, 2012

WHAT TO LOOK FOR What network protocols What ports SQL Server is listening on Whether remote connections are allowed

Page 9: oPASS  – March 8, 2012

SERVER LEVEL CONCERNS SQL Server 2000 and above SQL Server 2005 and above

Page 10: oPASS  – March 8, 2012

ALL VERSIONS Logins

SQL Server logins Windows users Windows groups

Server Roles

Page 11: oPASS  – March 8, 2012

WHAT TO LOOK FOR Windows users (not service accounts) A lot of SQL Server logins Members of:

sysadmin securityadmin serveradmin Processadmin

Use of sa or sysadmin level accounts

Page 12: oPASS  – March 8, 2012

SQL SERVER 2005 AND ABOVE Server level securables DAC (remote) OLE automation SQL Mail xp_cmdshell Password policy enforcement Impersonation of Logins

Page 13: oPASS  – March 8, 2012

VISUALIZING SECURABLES

Page 14: oPASS  – March 8, 2012

WHAT TO LOOK FOR (2005+) Everything in all versions list CONTROL permission at Server level IMPERSONATE of sa or sysadmin logins SQL logins without full password policy

enforcement: No enforcement at all Password never expires

Page 15: oPASS  – March 8, 2012

DATABASE LEVEL CONCERNS SQL Server 2000 and above SQL Server 2005 and above

Page 16: oPASS  – March 8, 2012

ALL VERSIONS How database users map to server logins Use of guest user (except system DBs) Database Owner (maps as dbo) Members of database roles:

db_owner db_ddladmin db_securityadmin

Database level permissions (CREATE)

Page 17: oPASS  – March 8, 2012

SQL SERVER 2005+ Permissions at database securable level Permissions at schema securable level Encryption key escrow

Page 18: oPASS  – March 8, 2012

WHAT TO LOOK FOR Use of database owner by application Use of db_owner by application End users with too many rights Developers in the following roles in prod:

db_owner db_ddladmin db_securityadmin

Page 19: oPASS  – March 8, 2012

QUESTIONS & ANSWERS