How do I keep a mySQL database secure?

前端 未结 5 1166
-上瘾入骨i
-上瘾入骨i 2021-02-08 09:46

I\'m going to be implementing a PHP/mySQL setup to store credit card information.

It seems like AES_ENCRYPT/AES_DECRYPT is the way to go,

相关标签:
5条回答
  • 2021-02-08 10:22

    I agree, but don't the cc if you don't need too. But if you really have too, make sure the file that have it is not accessible on the web. You can write a binary that would return the key. This way it's not store in clear text. But if your server is compromise it's still easy to get it.

    0 讨论(0)
  • 2021-02-08 10:24

    You should think long and hard about whether you REALLY need to keep the CC#. If you don't have a great reason, DON'T! Every other week you hear about some company being compromised and CC#'s being stolen. All these companies made a fatal flaw - they kept too much information. Keep the CC# until the transaction clears. After that, delete it.

    As far as securing the server, the best course of action is to secure the hardware and use the internal system socket to MySQL, and make sure to block any network access to the MySQL server. Make sure you're using both your system permissions and the MySQL permissions to allow as little access as needed. For some scripts, you might consider write-only authentication. There's really no encryption method that will be foolproof (as you will always need to decrypt, and thus must store the key). This is not to say you shouldn't - you can store your key in one location and if you detect system compromise you can destroy the file and render the data useless.

    0 讨论(0)
  • 2021-02-08 10:31

    MySQL, there is six easy steps you can do to secure your sensitive data.

    Step 1: Remove wildcards in the grant tables

    Step 2: Require the use of secure passwords

    Note: Use the MySQL “--secure-auth” option to prevent the use of older, less secure MySQL password formats.

    Step 3: Check the permissions of configuration files

    Step 4: Encrypt client-server transmissions

    Step 5: Disable remote access

    Step 6: Actively monitor the MySQL access log

    Security Tools

    0 讨论(0)
  • 2021-02-08 10:31

    the security you need depends on your application. for example, if the only time the cc# will be used is when the user is logged in (thin online store type scenario), then you can encrypt the cc# with the a hash of the user's plain-text password, a per-user salt, and a dedicated cc# salt. do not store this value permanently.

    since you're not storing this value, the only time you can get this value is when the user enters their password to log in. just make sure you have good session expiration and garbage collection policies in place.

    if this situation does not apply to you, please describe your situation in more detail so we can provide a more appropriate answer.

    0 讨论(0)
  • 2021-02-08 10:31

    Put your database files outside computer lets say external hdd and keep it at safe place. Works only if you can develop this project at only place where this external drive is placed :) Or you can at least protect those files using file system encryption tools like https://itsfoss.com/password-protect-folder-linux/

    In case of production environment I agree with Kyle Cronin.

    0 讨论(0)
提交回复
热议问题