Changes

Choose a hosting provider

720 bytes added, 9 years ago
/* High Technical */
</li>
</ul>
<olul>'''Databasehardening''' A key approach discussed elsewhere in protecting data, both at rest - on disk - and in use - in memory, is to encrypt these data stores either as part of full disk encryption or as individual restricted encrypted mount points. Below are further guides for specific hardening techniques for the MySQL database system.
<li>
[http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips| MySQL Security Best Practices]
</li>
<li>
[http://rochakchauhan.com/blog/2013/11/19/security-and-hardening-tips-for-mysql/| Security and Hardening Tips for MySQL]
</li>
<li>
[http://www.securethelock.com/2014/01/09/12-steps-for-hardening-mysql-from-attackers/| 12 steps for Hardening MySQL from Attackers]
</li>
</ol>
<olul>
'''Web app'''
<li>