Ideas for Improving ASP and ASP.NET Web Application Security - Part 2
page 2 of 11
by Brett Burridge
Feedback
Average Rating: This article has not yet been rated.
Views (Total / Last 10 Days): 38117/ 85

Check SQL Server user permissions

This is basic security advice, but a surprising number of developers embed the SQL Server system administrator (sa) account credentials within their application connection strings.  This leads to two major issues.

·         The account credentials are visible to anyone who has access to the application's source code.

·         Should the website be compromised the malicious user may be able to delete tables, drop databases and be able to do all manner of other undesirable things.  It is, therefore, highly recommended that a new SQL Server user account be created for the Internet user.  This user should only be given access to the objects they are going to need to access.  If they only need read access for a table for example, then they should only be given SELECT permission and not INSERT, UPDATE or DELETE permission.

The use of stored procedures is highly recommended as a means of improving security because then the user only needs to be given EXEC permissions on the stored procedures they need to use.

 

Alternatively, it is possible to use Windows authentication for the SQL Server access, in which case for applications using anonymous access,, the IUSR_machinename could be configured as a SQL Server user and given the minimum level of object access.


View Entire Article

User Comments

No comments posted yet.

Product Spotlight
Product Spotlight 





Community Advice: ASP | SQL | XML | Regular Expressions | Windows


©Copyright 1998-2024 ASPAlliance.com  |  Page Processed at 2024-04-25 4:35:15 PM  AspAlliance Recent Articles RSS Feed
About ASPAlliance | Newsgroups | Advertise | Authors | Email Lists | Feedback | Link To Us | Privacy | Search