Common security issues
Before going into detail on complex issues, you must first understand some basic points that will help you prevent misuse or attacks.
General guidelines
In MySQL 8, all connections, queries, and operations performed by the user are based on the Access Control Lists (ACLs) security. The following are some general guidelines related to security:
- Don't allow access to the
user
table to any user except the root account. Manage user privileges withGRANT
andREVOKE
statements. - Use encrypted protocol, such as SSH or SSL, in the case of data transfer over the internet. MySQL 8 supports SSL connections for that.
- Use proper defensive programming techniques at the time when the client is entering data into MySQL using an application.
- Use a hashing function to store passwords into the MySQL 8 database; don't store plain text as a password. As the same way for password recovery consider some string as salt and use
hash(hash(password)+salt)
values. - Use a proper password policy to protect...