SQLServerCentral Article

Building a Security Philosophy

,

I think we all should have some type of base philosophy about security that

keeps on us track during busy weeks. Some of us are lazy about it, some haven't

thought about it, some would protect the data so well no one could use it! A

full discussion of security could easily fill a book, so let's narrow it down a

bit for this discussion by looking at what rights you give to non sysdamin

users. These comments apply to production and usually QA servers, not

development servers.

I start with a pretty simple approach; you're either a sysadmin or you're

nobody! I like the concept of junior/assistant DBA's to handle the workload, but

in practice they don't get the job unless I trust them. So even though we have a

number of fixed server roles (listed below) I don't use them. I'm not suggesting

they be removed from the product as they may be useful in some scenarios, but in

my career I've never had a reason to use them. I don't see any point in giving

someone just processadmin for example, how often is there a need for a person

you only trust to kill spids that run wild? The one temporary exception at the

server level is to let someone temporarily have permissions to run a trace

(ALTER TRACE) which was added in SQL 2005, prior to that they had to be a

sysadmin.

bulkadmin Granted: ADMINISTER BULK OPERATIONS
dbcreator Granted: CREATE DATABASE
diskadmin Granted: ALTER RESOURCES
processadmin Granted: ALTER ANY CONNECTION, ALTER SERVER STATE
securityadmin Granted: ALTER ANY LOGIN
serveradmin Granted: ALTER ANY ENDPOINT, ALTER RESOURCES, ALTER SERVER STATE,

ALTER SETTINGS, SHUTDOWN, VIEW SERVER STATE

setupadmin Granted: ALTER ANY LINKED SERVER
sysadmin Granted with GRANT option: CONTROL SERVER

Equally, I don't assign anyone to any of the fixed roles on a permanent

basis. There may be times when I temporarily grant someone deeper access to a

single database and in most cases I'll put them in db_owner, supplementing that

with a warning to them to not screw things up! In particular I don't use

db_datareader/db_datawriter, preferring to explicitly grant permissions in all

cases and almost always preferring to gate access using stored procedures.

Fixed Database Role Database-level Permission Server-level Permission
db_accessadmin Granted: ALTER ANY USER, CREATE SCHEMA Granted: VIEW ANY DATABASE
db_accessadmin Granted with GRANT option: CONNECT  
db_backupoperator Granted: BACKUP DATABASE, BACKUP LOG, CHECKPOINT Granted: VIEW ANY DATABASE
db_datareader Granted: SELECT Granted: VIEW ANY DATABASE
db_datawriter Granted: DELETE, INSERT, UPDATE Granted: VIEW ANY DATABASE
db_ddladmin Granted: ALTER ANY ASSEMBLY, ALTER ANY ASYMMETRIC KEY, ALTER ANY

CERTIFICATE, ALTER ANY CONTRACT, ALTER ANY DATABASE DDL TRIGGER, ALTER

ANY DATABASE EVENT, NOTIFICATION, ALTER ANY DATASPACE, ALTER ANY

FULLTEXT CATALOG, ALTER ANY MESSAGE TYPE, ALTER ANY REMOTE SERVICE

BINDING, ALTER ANY ROUTE, ALTER ANY SCHEMA, ALTER ANY SERVICE, ALTER ANY

SYMMETRIC KEY, CHECKPOINT, CREATE AGGREGATE, CREATE DEFAULT, CREATE

FUNCTION, CREATE PROCEDURE, CREATE QUEUE, CREATE RULE, CREATE SYNONYM,

CREATE TABLE, CREATE TYPE, CREATE VIEW, CREATE XML SCHEMA COLLECTION,

REFERENCES

Granted: VIEW ANY DATABASE
db_denydatareader Denied: SELECT Granted: VIEW ANY DATABASE
db_denydatawriter Denied: DELETE, INSERT, UPDATE  
db_owner Granted with GRANT option: CONTROL Granted: VIEW ANY DATABASE
db_securityadmin Granted: ALTER ANY APPLICATION ROLE, ALTER ANY ROLE, CREATE SCHEMA,

VIEW DEFINITION

Granted: VIEW ANY DATABASE

Within the database I create one or two roles per application depending on

how it's being built. For example, for most web applications everything will run

under a single account, so I'll create a role called MyWebApp, add the

login/user to that role, and then grant the appropriate access. Having the role

allows me to add - if needed - a developer so that they can debug using the

exact same permissions. In some cases I'll set up a secondary role called

MyWebAppRO, the RO indicating it's a read only role and I use it for any type of

dynamic search that might have a sql injection vulnerability.

As far as logins, I prefer to use Windows groups whenever possible, starting

with a base DBA group that I assign to the SQL sysadmin role. Using groups

reduces the time I spend administering and of course using NT authentication

lets me leverage the strengths of AD; requiring strong passwords, account

lockout, etc. For applications I prefer that the connection be done using a

single service account (unless we need a separate one that will be for read

only) and I load these individually, not as a group. Ideally that service

account is used only on an application server/web server. If a sql login is used

- and this is common for desktop client/server apps - I also set up a separate

login per application, and try to make sure that the developers have been very

careful about how they store/retrieve the password for the account.

Is that overkill? Am I missing out on the possibilities that the built in

roles offer? Or do you agree with my philosophy?

Visit my blog at http://blogs.sqlservercentral.com/andy_warren/default.aspx

Rate

4 (13)

You rated this post out of 5. Change rating

Share

Share

Rate

4 (13)

You rated this post out of 5. Change rating