«

»

Aug 28

Your Top 10 Security Steps to Protect Your Data, Part 4


4. Devise a plan for securing your databases


When you plan your database design, also plan how to secure your database files. It’s much easier to design security into your database from the outset, than to incorporate it later, after the horse has already galloped out of the barn and the damage has been done.
• List the areas of the file that you want to protect, such as particular tables, fields, records, layouts, value lists, and scripts. Plan the number of privilege sets you need to enforce the varying levels of file access that you and your users will require.
• Determine if you need individual accounts for each user (recommended), or accounts that multiple users can share (such as a “Marketing” or a “Sales” account-more risky depending on skills sets)
• Decide if you want to enable the Guest account, which permits users to open the file without logging in and providing account information. If you’re using the Guest account, assign the most limited privilege set possible; otherwise, consider disabling it completely.
• Determine if you need to enable any extended privileges (for example, Network sharing or Instant Web Publishing options) for certain privilege sets.
• Create the accounts you need in the file, and assign the appropriate privilege set to each account.
Consider developing a spreadsheet too  that lists the types of users and summarizes their privileges, such as View, Create, Edit, Delete Records users, Modify, Execute Scripts, and so on.
You can provide limited access to some features, for example deleting records, by using record-by-record privileges with some databases. If this feature is of interest to you, shop around for it when looking for your database solution.

Leave a Reply