Home
Process Management
Auth
Authentication
Authorization
Admin Login Accounts
App Login Accounts
Connection Strings
SQL Server Service Accounts
Reporting Needs
AWS/Azure
Is SQL Auth Secure?
Configuration
Physical Security
Operating System
Protecting Ports
Configuration
Patches
Version of SQL Server
Backups
Backup Files
SQL Injection
What is SQL Injection
What is the risk posed by SQL Injection?
How to Prevent SQL Injection
.Net Code
Data In Transit
What is Data in Transit
How to protect Data in Transit
Sensitive Data
What types of data are sensitive
Where to protect sensitive data
How to protect sensitive data
Compliance
Overview
Guidelines
Risk Management
Hackers
Why are hackers attacking?
How do hackers attack?
Process Management
Ongoing Processes
Resources
The Urgent To Do List
Comprehensive Checklist
Installation Checklist
Typical Web App Design
Other Guidance
More
Worst Practices
Security Principles
SQL Server Communities
Web Site To Do List
Scripts
Overview
Rebuild every index on every table in a database.
Refresh the metadata for every view in the database.
Update the index statistics for every index on every table.
Find the number of rows in every table in your database
sp_search_code
Find Invalid Characters
Home
docs
Docs
Blog
About
Docs
Blog
About
Process Management
SQL Server Security
Docs
Process Management
Process Management
Auth
Authentication
Authorization
Admin Login Accounts
App Login Accounts
Connection Strings
SQL Server Service Accounts
Reporting Needs
AWS/Azure
Is SQL Auth Secure?
Configuration
Physical Security
Operating System
Protecting Ports
Configuration
Patches
Version of SQL Server
Backups
Backup Files
SQL Injection
What is SQL Injection
What is the risk posed by SQL Injection?
How to Prevent SQL Injection
.Net Code
Data In Transit
What is Data in Transit
How to protect Data in Transit
Sensitive Data
What types of data are sensitive
Where to protect sensitive data
How to protect sensitive data
Compliance
Overview
Guidelines
Risk Management
Hackers
Why are hackers attacking?
How do hackers attack?
Process Management
Ongoing Processes
Resources
The Urgent To Do List
Comprehensive Checklist
Installation Checklist
Typical Web App Design
Other Guidance
More
Worst Practices
Security Principles
SQL Server Communities
Web Site To Do List
Scripts
Overview
Rebuild every index on every table in a database.
Refresh the metadata for every view in the database.
Update the index statistics for every index on every table.
Find the number of rows in every table in your database
sp_search_code
Find Invalid Characters
Ongoing Processes
Security is not something to implement and forget. It must be monitored.