This chapter provides a methodology and steps for securing a database server. The methodology can be adapted for your own scenario. The steps put the methodology into practice.
To gain the most from this chapter:
Read Chapter 2, "Threats and Countermeasures." This chapter provides an explanation of potential threats faced by Web applications and downstream database servers.
Use the snapshot . The section, "Snapshot of a Secure Database Server," later in this chapter lists the attributes of a secure database server. It reflects distilled input from a variety of sources including customers, industry experts, and internal Microsoft development and support teams . Use the snapshot table as a reference when configuring your database server.
Use the checklist . The "Checklist: Securing Your Database Server" in the "Checklist" section of this guide provides a quick reference. Use the checklist to quickly evaluate the scope of the required steps and to help you work through the individual steps.
Use the "How To" section . The "How To" section in this guide includes the following instructional articles that help you implement the guidance in this chapter:
"How To: Use Microsoft Security Baseline Analyzer"
"How To: Use IPSec"
"How To: Implement Patch Management"