MySQL security - What are the security recommendations while using MySQL?

What are the security recommendations while using MySQL?

Some of the security recommendations while using MySQL are as follows:

1. Access to the user table should never be given to avoid SQL injection attacks.

2. Privileges such as GRANT and REVOKE must be made use of.

3. SHOW GRANTS can be used to see the list of users who have access.

4. Never run the MySQL server as the Unix root user

5. Do not store the cleartext passwords in your database.

6. Do not choose the passwords from the dictionaries.

7. Invest in a firewall. This protects you from at least 50% of all types of exploits in any software. Put MySQL behind the firewall or in a demilitarized zone (DMZ).

8. Applications that access MySQL should not trust any data entered by users, and should be written using proper defensive programming techniques.

9. Do not transmit plain (unencrypted) data over the Internet. This information is accessible to everyone who has the time and ability to intercept it and use it for their own purposes. Instead, use an encrypted protocol such as SSL or SSH. MySQL supports internal SSL connections. Another technique is to use SSH port-forwarding to create an encrypted (and compressed) tunnel for the communication.
MySQL MyISAM Table
What are MyISAM tables?, Explain the difference between MyISAM Static and MyISAM Dynamic, What does myisamchk do?, Explain advantages of InnoDB over MyISAM, Explain advantages of MyISAM over InnoDB....
MySQL - What is HEAP table?
MySQL HEAP table - Tables that are present in the memory are called as HEAP tables. When creating a HEAP table in MySql...
MySQL Query Cache - What is Query Cache in MySQL?
MySQL Query Cache - Query Cache in MySQL is used in scenarios when the same queries need to be executed on the same data set.....
Post your comment