TSQL Tuesday #63 – How do you manage security?
26February 3, 2015 by Kenneth Fisher
Come on down! You’re the next contestant on T-SQL Tuesday! I’m your host Kenneth Fisher and this month I’d thought we might talk about security. Security is one of those subjects that most DBAs have to deal with regardless of specialty. So as something we all have to work with at some point or another what are some tips you’d like to share? What’s the best security design? You’ve picked up a legacy system and the security is awful, how do you fix it? Any great tools out there you’d like to share? Hate it or love it I’m betting we all have something to say.
What is T-SQL Tuesday
T-SQL Tuesday is a blog party started by Adam Machanic (b/t) just over five years ago. The first Tuesday of each month a blogger hosts the party and suggests a topic. Then anyone who is interested blogs on that topic. It can be a lot of fun and quite a challenge to blog on a topic you didn’t pick. Not to mention the time limit. I didn’t mention the time limit? Oh, well, you have one week to write your blog and then it has to be posted on the second Tuesday of the month. If you want to host just contact Adam and ask for a spot. I believe there is a requirement that you have to have participated at least a few times, but hey that’s only reasonable right?
How to join the party
- Your post must be published between 00:00 GMT Tuesday February 10, 2015 and 00:00 GMT Tuesday February 10, 2015. Don’t be late!
- Your post must contain the T-SQL Tuesday logo at the top (see above) and the image must link back to this blog post. Otherwise how will we know it’s a T-SQL Tuesday post?
- Trackbacks should work, but if not please put a link to your post in the comments section so everyone can see your contribution!
[…] and as this month’s T-SQL Tuesday (hosted by Kenneth Fisher – @sqlstudent144) is on the topic of security, that’s what this post […]
Thanks Kenneth! Check out http://sqlblog.com/blogs/rob_farley/archive/2015/02/10/sql-injection-the-golden-rule.aspx when you have time. 🙂
Kenneth, here is mine -> http://borishristov.com/blog/t-sql-tuesday-63-manage-security/
Thanks Kenneth for hosting this month’s T-SQL Tuesday blog party. Here is my contribution to the party – http://www.sqlmastersconsulting.com.au/SQL-Server-Blog/t-sql-tuesday-63-how-do-you-manage-security
Here is my contribution:
http://blogs.lessthandot.com/index.php/datamgmt/ssis/t-sql-tuesday-63-how-do-you-manage-security/
Here is my contribution to this month’s TSQL2SDAY : http://t-sql.dk/?p=1104
Thanks for hosting it Kenneth
Here’s mine. Thanks for hosting. https://sqlswimmer.wordpress.com/
[…] […]
[…] TSQL Tuesday! Edition 63 is being hosted by Kenneth Fisher (@sqlstudent144). The topic this month is security, and what a globally relevant topic it […]
[…] we look at security. Kenneth Fisher has chosen this as his topic for February and you can read his invite here. There are lots of choices on what you write about, and I’m looking forward to reading what […]
Here’s mine. EKM HSM Oh My! https://sqljudo.wordpress.com/2015/02/10/tsql-tue-63-ekm/
Sir, thanks for hosting this month’s T-SQL Tuesday. Here’s my take on it http://www.edwinmsarmiento.com/tsql-tuesday-63-how-do-you-manage-security/
Here is mine, thanks for hosting. http://www.jamesdorame.com/index.php/2015/02/10/what-level-of-access-do-you-really-need-or-least-level-of-access-by-default-tsql-tuesday-63/
My first time contributing to TSQL Tuesday after just starting blogging this month. Thanks for hosting. https://sqlsanctum.wordpress.com/2015/02/10/t-sql-tuesday-63-how-do-you-manage-security/
Here is mine, and thank you for hosting. http://www.jamesdorame.com/index.php/2015/02/10/what-level-of-access-do-you-really-need-or-least-level-of-access-by-default-tsql-tuesday-63/
[…] TSQL Tuesday #63 – How do you manage security? […]
Thank you Kenneth! Here is mine. http://royalsql.com/2015/02/10/ima-make-a-deal-with-the-sa-so-the-sa-dont-bite-no-more/ Extra points to anyone who can guess the song before I add it to my site playlist. 🙂
Hey, Ken! Here’s my entry for T-SQL Tuesday #63 – Thanks for hosting this month!!
http://www.sqlservercentral.com/blogs/pearlknows/2015/02/10/t-sql-tuesday-63-managing-security-enforce-sql-login-policies/
[…] This month’s T-SQL Tuesday (hosted by Kenneth Fisher – @sqlstudent144) is about security This hasn’t been my area of expertise for a long time, although I did write a long TechNet Magazine article about common security issues and solutions back in 2009. […]
Here you go Kenneth: http://www.sqlskills.com/blogs/paul/physical-security/
Thanks!
[…] the invitation is for us to share our stories on how we like to manage security. Or at least that is the request […]
Here is mine http://bit.ly/1vD8Oiv
[…] month’s T-SQL Tuesday is about how we manage database security, hosted by the ever effervescent Kenneth […]
Somehow my own post didn’t ping back! So thanks me for hosting and here’s mine. https://sqlstudies.com/2015/02/10/dba-myths-you-cant-deny-something-to-a-member-of-db_owner-database-role/ (Yes I know I’m late but yesterday was a busy day. I posted on time I promise.)
[…] months T-SQL Tuesday is hosted by none other than Kenneth Fisher (B|T). His topic for this month revolves around security and how you manage security. There probably […]
Here you go Kenneth; thanks for hosting https://chrisyatessql.wordpress.com/2015/02/11/tsql-tuesday-63-security/