MIT Logo

Database Hardening Best Practices

Abstract:

This resource provides a list of appropriate steps to reduce the vulnerability of database systems. Databases can be used to store extremely important information, and their security is therefore very important. These steps can help reduce data loss and leakage, as well as unauthorized access.

Author:
Berkeley Information Security Office
Domain:
Dimension: ,
Region:
Data Type:
Keywords:
MIT Political Science
MIT Political Science
ECIR
GSS