Whenever application security is mentioned, people think of securing applications against some of the most frequent attacks such as injection, broken authentication, sensitive data exposure, and the like. However, while these attacks are prevalent, knowing how to protect your application from them alone will not be sufficient - especially when you’re running MySQL. Today we are going to look at a different side of security - we are going to look into how to properly secure MySQL.
As MySQL security is a pretty big thing, treat this post as the start of a series of posts regarding MySQL security measures. We will not cover everything, but this post should provide the foundation of some of MySQL’s security measures.
Why Do You Need to Secure MySQL? …
[Read more]