MySQL Security Essentials
15 April 3:30PM - 4:20PM @ Ballroom F
50 minutes conference
This presentation provides an overview and checklist of the essentials needed to improve MySQL security and provide an understanding of managing various levels of risk and also what is needed to ensure segregation of duties and passing an External IT financial audit. Default MySQL security generally sucks. What are the essentials for any initial MySQL installation? What is the minimum an Oracle DBA should understand and undertake for a neglected MySQL system? There is no super user privilege protection, or tight filesystem security until the most recent versions of MySQL. Learn what MySQL 5.6 and MySQL 5.7 has done to improve installation essentials. The MySQL privilege system provides several levels of data protection when implemented correctly, however this is rarely used. The most common user permission implementation creates several security and auditing risks? What are your MySQL user permissions, and how can developers exploit them? What can users do to utilize the generally acceptable concept of roles. There are ways to secure communications within a MySQL topology using SSL, approaches to managing exposed public facing data collection via the BLACKHOLE storage engine, auditing plugin interfaces from various products and MySQL variants, and external authentication capabilities with PAM and LDAP for example.
MySQL Database Consultant, Pythian
Ronald has over 25 years of professional RDBMS experience in MySQL, Oracle, and Ingres. His expertise covers MySQL, LAMP and cloud-based consulting in architecture, performance, scalability and business continuity. Ronald is a former employee of the MySQL Inc consulting team (06-08) and Oracle Corporation (96-99). He has currently published 4 books on MySQL, his most recent titles available from Oracle Press include Effective MySQL: Optimizing SQL Statements, Effective MySQL: Backup & Recovery and Effective MySQL: Replication Techniques in Depth.