Welcome to our Secure Development Tips blog

Every other week, we provide expert tech tips on how to build and deploy secure applications.  These best practices, derived from Security Innovation’s assessments of the worlds’ most dominant software applications,  are taken directly from our TeamMentor product, which includes more than 3,500 guidance assets and articles on secure software design, coding and testing.    

Recent Security Innovation Blog Post:

Subscribe by Email

Your email:

Secure Development Tips

a blog with tips relating to secure application development, from Security Innovation's eknowledge database, TeamMentor

Current Articles | RSS Feed RSS Feed

Allow Only Trusted Hosts to Connect to the Database Server


What to Do

Allow only trusted hosts to connect to the database server.


Direct access allows an attacker to establish a connection to the SQL Server and issue commands. This could lead to unauthorized access to data.


Perform the following actions to restrict access to your SQL Server:

  1. Restrict access from the outside. Configure the firewall to make sure that SQL server ports are not visible from outside of the perimeter network.
  2. Restrict access from within the perimeter. Restrict direct access by unauthorized internal hosts via internal firewalls and port filtering.
  3. Minimize exposure. The production database server should only be accessible from the application server(s) it works with and a minimum set of other maintenance systems for monitoring, external logging, backup, and administration. Development and production systems should not share the same database server, and development machines should not have access to the production servers.


Post Comment
Website (optional)

Allowed tags: <a> link, <b> bold, <i> italics