Il CISO della mia azienda è attualmente fuori sede e come responsabile IT mi è stato chiesto di inviare alcune domande di sicurezza a una società nella speranza di implementare un database SQL per gestire gli stipendi, gli ordini ecc.
Ho poca esperienza in merito a SQL, ho incluso la mia lista di 9 domande qui sotto, ho perso alcune domande ovvie?
How does your solution protect against SQL Injection attacks? Your application has an wide amount of functionality, do you utilize Prepared Statements, Input Validation etc?
How does your product protect the usernames and passwords for accessing the database? Are the passwords hashed and salted, if so which hashing functions and salting mechanisms do you use? Additionally, if salts are being used are different salt values used for each individual password?
Is your solution regularly tested with penetration tests? If so how often and please would you provide the name of the company that carried out the testing? Also if we have an independent penetration test will this break any Terms of Use, ie are we still covered to receive full support and services from you?
Regarding backups, you mentioned that these can be implemented for automatic backups, can encryption of the backups be done automatically through your product also or is this done manually?
I noticed that you are using SQL Server Version 2014, is it possible for this to be migrated to a newer version?
You mentioned about costs changing for each database if the workflow is different, regarding this if we wanted to start using your solution only in a LAN environment (no remote access) and wanted to include remote access at a later date would this cost us more? I imagine this is simply a case of opening a port on the server.
You mentioned that you are able to implement VPN access to the SQL server, which VPN protocols does your application support? L2TP, IPsec etc?
Are there any logging capabilities included? Can the admin see which user logged on, what actions were taken and from which IP address or do you provide an Intrusion Detection System to do this?