Database InfoSec: Best Practices (W8)

There are so many ways to secure a database, but what are the most common, best practices? Listed below are what I believe to be the top 5 best practices for database security.

  1. Delete unused accounts. If accounts are not being used, more than likely, they’re not being maintained either. As a result, the unused database account because a vulnerability.
  2. Encrypt sensitive database materials. Personal information is mostly recognized as sensitive and valuable, which is why hackers attempt to gather the information.
  3. Restrict user access. Privileged users should be limited to parts of the database needed to complete their duties. Other users, especially those who simply need to view information within the database, can be granted read-only access.
  4. Eliminate all vulnerabilities. Any database weaknesses will lead to security holes in the system. If patches are needed, or any other security measure to protect the database, it should be done quickly, effectively, and efficiently.
  5. Develop an effective recovery plan. Disaster recovery is important for all organizations and individuals. DR could include backups, an extra office location away from danger, or other things that could be used to recovery data and/or facilities after a disaster.

I believe these best practices will require constant attention, but they’ll allow organizations to keep their databases safe. If each practice is completed proficiently, data risks and threats should decrease significantly.

laptops-database_11581173a13ae46bc

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s