<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>DBA | Raving Roo</title>
	<atom:link href="https://ravingroo.com/tag/dba/feed/" rel="self" type="application/rss+xml" />
	<link>https://ravingroo.com</link>
	<description>Chew the Fat</description>
	<lastBuildDate>Fri, 17 May 2013 22:05:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/ravingroo.com/wp-content/uploads/2019/06/cropped-kangaroo-silhouette2.png?fit=32%2C32&#038;ssl=1</url>
	<title>DBA | Raving Roo</title>
	<link>https://ravingroo.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">25842277</site>	<item>
		<title>DBA: SQL Audit Checklist For Internal Security Review</title>
		<link>https://ravingroo.com/337/dba-sql-audit-checklist-internal-security-review/</link>
					<comments>https://ravingroo.com/337/dba-sql-audit-checklist-internal-security-review/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Fri, 17 May 2013 21:21:18 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[checklist]]></category>
		<category><![CDATA[DBA]]></category>
		<category><![CDATA[icacls]]></category>
		<category><![CDATA[review]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<category><![CDATA[SQL 2008]]></category>
		<category><![CDATA[SQL query]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 2008]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=337</guid>

					<description><![CDATA[<p><img width="1024" height="683" src="https://ravingroo.com/wp-content/uploads/2013/05/checklist.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/checklist.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/checklist.jpg?resize=300%2C200&amp;ssl=1 300w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>To stay on top of security you need to regularly review your server configurations. It&#8217;s helpful to build a checklist to be used as part of an internal security audit review. Below is just such a checklist, specifically tailored to audit a SQL 2008 Server running on Windows Server 2008. Most of what&#8217;s in this...<br /><a class="moretag" href="https://ravingroo.com/337/dba-sql-audit-checklist-internal-security-review/">Read On...</a></p>
The post <a href="https://ravingroo.com/337/dba-sql-audit-checklist-internal-security-review/">DBA: SQL Audit Checklist For Internal Security Review</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/337/dba-sql-audit-checklist-internal-security-review/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">337</post-id>	</item>
		<item>
		<title>DBA: SQL Server Security Best Practices</title>
		<link>https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/</link>
					<comments>https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Tue, 14 May 2013 21:45:43 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[best practices]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[DBA]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sysadmin]]></category>
		<guid isPermaLink="false">http://ravingroo.com/?p=249</guid>

					<description><![CDATA[<p><img width="1024" height="341" src="https://ravingroo.com/wp-content/uploads/2013/05/5600902042_f4c71120ac_b.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/5600902042_f4c71120ac_b.jpg?w=1024&amp;ssl=1 1024w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/05/5600902042_f4c71120ac_b.jpg?resize=300%2C99&amp;ssl=1 300w" sizes="(max-width: 1024px) 100vw, 1024px" /></p><p>As part of an internal security review, I put together the following best practices guideline to secure SQL servers. This is just an example, and is not meant to be a comprehensive list of SQL server security parameters. DATABASE CREATION AND CHANGES New databases must be requested using a SQL database request form with proper...<br /><a class="moretag" href="https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/">Read On...</a></p>
The post <a href="https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/">DBA: SQL Server Security Best Practices</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/249/dba-sql-server-database-security-best-practices-business-continuity/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">249</post-id>	</item>
		<item>
		<title>DBA: Create A SQL Server Database Request Form For Auditing, Change Tracking And Security</title>
		<link>https://ravingroo.com/100/dba-create-a-sql-server-database-request-form-for-auditing-change-tracking-and-security/</link>
					<comments>https://ravingroo.com/100/dba-create-a-sql-server-database-request-form-for-auditing-change-tracking-and-security/#comments</comments>
		
		<dc:creator><![CDATA[David K. Sutton]]></dc:creator>
		<pubDate>Sat, 02 Feb 2013 09:31:19 +0000</pubDate>
				<category><![CDATA[IT Security]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[change tracking]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[DBA]]></category>
		<category><![CDATA[request form]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[server]]></category>
		<guid isPermaLink="false">http://leftturnahead.com/?p=100</guid>

					<description><![CDATA[<p><img width="1000" height="1000" src="https://ravingroo.com/wp-content/uploads/2013/02/Microsoft-SQL-Server-2012.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/02/Microsoft-SQL-Server-2012.png?w=1000&amp;ssl=1 1000w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/02/Microsoft-SQL-Server-2012.png?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/ravingroo.com/wp-content/uploads/2013/02/Microsoft-SQL-Server-2012.png?resize=300%2C300&amp;ssl=1 300w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><p>Change tracking, resource allocation and security auditing are three very important issues for any IT administrator, particularly DBAs (database administrators). One item that can easily be overlooked is at the point of database creation. Why is the database needed? Who is requesting it? Will the database be used for production or testing/development? What are the...<br /><a class="moretag" href="https://ravingroo.com/100/dba-create-a-sql-server-database-request-form-for-auditing-change-tracking-and-security/">Read On...</a></p>
The post <a href="https://ravingroo.com/100/dba-create-a-sql-server-database-request-form-for-auditing-change-tracking-and-security/">DBA: Create A SQL Server Database Request Form For Auditing, Change Tracking And Security</a> first appeared on <a href="https://ravingroo.com">Raving Roo</a>.]]></description>
		
					<wfw:commentRss>https://ravingroo.com/100/dba-create-a-sql-server-database-request-form-for-auditing-change-tracking-and-security/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">100</post-id>	</item>
	</channel>
</rss>
