What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team



Similar documents
<Insert Picture Here> MySQL Security In A Cloudy World

MySQL Security: Best Practices

SQL Server Hardening

Hardening MySQL. Maciej Dobrzański maciek at

MySQL Security: What s New & Best Practices. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Thick Client Application Security

MySQL Security for Security Audits

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Securing Data in Oracle Database 12c

Web Plus Security Features and Recommendations

What is Web Security? Motivation

SQL Server Hardening

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

BYOD Guidance: BlackBerry Secure Work Space

SBClient SSL. Ehab AbuShmais

Xerox DocuShare Security Features. Security White Paper

Put a Firewall in Your JVM Securing Java Applications!

SQL Server Encryption Overview. September 2, 2015

DBA Tutorial Kai Voigt Senior MySQL Instructor Sun Microsystems Santa Clara, April 12, 2010

Microsoft SQL Server Security Best Practices

General DBA Best Practices

Configuring Security Features of Session Recording

Security Controls for the Autodesk 360 Managed Services

Dashlane Security Whitepaper

SQL Server Hardening

Microsoft SQL Server Security & Auditing. March 23, 2011 ISACA Chapter Meeting

Alliance Key Manager Solution Brief

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

FileCloud Security FAQ

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

NovaBACKUP. Storage Server. NovaStor / May 2011

Criteria for web application security check. Version

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

BM482E Introduction to Computer Security

White Paper BMC Remedy Action Request System Security

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Chapter 7 Managing Users, Authentication, and Certificates

Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER

How To Secure Your Data Center From Hackers

Training module 2 Installing VMware View

A Guide to Securing MySQL on Windows

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

System Administration Training Guide. S100 Installation and Site Management

Passing PCI Compliance How to Address the Application Security Mandates

Novi Survey Installation & Upgrade Guide

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Web Application Security Assessment and Vulnerability Mitigation Tests

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SANS Institute First Five Quick Wins

MIGRATIONWIZ SECURITY OVERVIEW

E-Commerce: Designing And Creating An Online Store

PowerChute TM Network Shutdown Security Features & Deployment

With Great Power comes Great Responsibility: Managing Privileged Users

How To Secure An Rsa Authentication Agent

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Securing Data on Microsoft SQL Server 2012

All Things Oracle Database Encryption

Salesforce1 Mobile Security Guide

Database Extension 1.5 ez Publish Extension Manual

Security and Control Issues within Relational Databases

Lotus Domino Security

Security Advice for Instances in the HP Cloud

Media Shuttle s Defense-in- Depth Security Strategy

Kentico CMS security facts

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Virtualization System Security

Novell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Oracle Database Security

5 Simple Steps to Secure Database Development

7.0 Self Service Guide

MS-55096: Securing Data on Microsoft SQL Server 2012

Dave Stokes MySQL Community Manager

Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Sync Security and Privacy Brief

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Security IIS Service Lesson 6

Security in Android apps

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Is Your SSL Website and Mobile App Really Secure?

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Locking down a Hitachi ID Suite server

NovaBACKUP Storage Server User Manual NovaStor / April 2013

Computer Security: Principles and Practice

<Insert Picture Here> PeopleTools Security, What's New in PeopleTools 8.50

Acano solution. Security Considerations. August E

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

WebLogic Server 6.1: How to configure SSL for PeopleSoft Application

GoodData Corporation Security White Paper

CTX-1259BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Administration

Planning the Installation and Installing SQL Server

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

SSL implementieren aber sicher!

Transcription:

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 3

About Me Former banking IT manager Veteran software developer Leading the MySQL server general development team With MySQL since 2006 Working out of Plovdiv, Bulgaria @gkodinov, georgi.kodinov@oracle.com

Agenda Overview of the new features Questions and answers 5

So What s New in 5.7 Security? 6

New MySQL 5.7 Security Features at a Glance MySQL firewall Secure by default Enterprise encryption Better account management Refactoring and housekeeping 7

MySQL Firewall 8

MySQL Firewall Operation MySQL Server Firewall Plugin SELECT 1+2 SELECT 1+2 SELECT Deny 1+2 OR.. SELECT?+? USE? Enterprise 9

MySQL Firewall Anatomy Engine Firewall Plugin Compares incoming queries with the allowed list Works on normalized statements Multiple modes Audit log plugin Statements Cache Entirely in memory Initialized from disk Content visible through INFORMATION_SCHEMA SELECT?+? USE? Enterprise 10

MySQL Firewall Benefits Helps preventing SQL Injection Can learn to pass-through wide variety of apps No need to re-parse Easy to install and uninstall Works on SQL Statements Enterprise 11

Secure By Default 12

What You Get Post-MySQL Installation? MySQL 5.6 and older MySQL 5.7 A development setup Wide open Must take extra step(s) to secure Obvious security problems fixed Open for authorized use Can take steps to relax restrictions 13

Why Secure by Default? More and more sensitive information stored in computers People increasingly dependent on information Helps new users avoid common mistakes Decreases MySQL attack surface Security compromises are explicit acts by the DBAs Low usability impact if applied carefully 14

WARNING! No absolute states in security! 15

Secure By Default Highlights Random account passwords on install Deploy without tests and demos No anonymous accounts Limit the scope of the FILE privilege Stricter permissions on installation files 16

Enhanced SSL Support Highlights The server comes fully equipped for SSL connections * Generate self signed certificates on site Libmysql based clients will attempt SSL by default Client option to enforce SSL Server option to require secure transport for all connections SSL, shared memory, UNIX sockets 17

Enterprise Encryption 18

What is Enterprise Encryption? At a glance A plugin, interfacing the OpenSSL library Allows generation and handling of RSA, DSA and DH key pairs SET @priv = CREATE_ASYMMETRIC_PRIV_KEY( RSA, 1024); SET @pub = CREATE_ASYMMETRIC_PUB_KEY( RSA, @priv); Allows encryption, signing and cyrptographic hashes SET @digest = CREATE_DIGEST( SHA512, cleartext ); SET @sig = ASYMMETRIC_ENCRYPT( RSA, @digest, @priv); Key generators use standard PEM format (compatible with external tools) Enterprise 19

Simple Example: Handling Sensitive Information Using MySQL Enterprise Encryption Network Sensitive Information The App Database Server Side Reports Public Key Private Key Enterprise Encryption Enterprise 20

Better User Account Management 21

Comfortable User Account Management Highlights Fully functional ALTER USER IF [NOT] EXISTS clause to user account statements Temporarily disable user accounts Authentication plugin that disables logins Time-based password expiration policy Offline server mode User account names now 32 characters long 22

Refactoring and Housekeeping Work 23

Remove Support for old, Pre-4.1 Passwords What s new in Refactoring? Known to be insecure since mysql-4.1! Responsible for a lot of spaghetti code Finally out in 5.7! Incompatible changes in mysql.user system table structure 24

Treat Passwords as Any Other Authentication Data Why? All authentication plugins must be equal Passwords are just one form of authentication How? Merge mysql.user.password into mysql.user.authentication_string Extend the authentication API to support converting between storage and clear text formats Clean up stray global plugin related variables and functions PASSWORD() @@old_passwords 25

Deprecate ENCODE()/DECODE() What s new in Refactoring? Old insecure, home grown algorithms Replaced by AES based functions 26

Refactor the ACL Code What s new in Refactoring? Isolated the ACL code into a sub-directory Split the huge sql_acl.cc into smaller logical groups of code 27

Remove Server Package s Perl Dependencies What s new in Refactoring? mysql_secure_install converted to a C program mysql_install_db converted to a C program and deprecated mysql_upgrade now doesn t need to call external binaries Why is this relevant to security? No longer need to pass passwords to the external utilities No worries that the utilities may use different configuration files Allowed extra hardening: e.g. remove the multiple root user accounts Allows unattended installation 28

Questions and Answers 29

30