Check Your Database ConfigurationsTeam Shatter Exclusive

Today, there are a myriad of database configuration options – many of which are either direct security settings, or that impact security. When a new database is installed, DBAs need to address many configuration options to enhance database security. Let’s look at a few database configurations that should be followed.

Database Management Systems (DBMS) are complex. In the infancy of the DBMS, there were only a handful of configuration options, leaving little choices for the DBAs in charge of them and minimizing the potential for error. The simple configuration options they were allowed to change included what to name the database instance, and which storage location would be used for the data files.

Today, there are a myriad of configuration options – many related to performance and enhanced feature sets such as replication, reporting and auditing. There are also many options that are either direct security settings, or that impact security. Having the correct configuration settings can determine whether or not your critical business information is secure and whether it could be compromised.

When a new database is installed, DBAs need to address many configuration options to enhance security. Let’s look at a few database configurations that should be followed.

Read full article in Database Journal >>

Leave a Reply

Name (required)

Mail (will not be published) (required)

Website

Please note: JavaScript is required to post comments.

Powered by