General discussion


Secure a MySQL database

By debate ·
Do you run MySQL as part of your enterprise structure? What additional tips can you suggest for securing MySQL? Share your comments about locking down MySQL, as discussed in the June 4 Security Solutions e-newsletter.

If you haven't subscribed to our free Security Solutions e-newsletter, sign up today!

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -


by admin17 In reply to Secure a MySQL database

One simple way to secure MySQL is to have it running on a server by itself and place that server behind a firewall. Next, grant permission for traffic from only your web server(s) to the MySQL server on port 3306. These simple actions should greatly minimize the potental for hacking, given that you just eliminated 65534 potential avenues for attack.

Collapse -

local bind

by nir In reply to Secure a MySQL database

It's nice to place the following lines within the the my.cnf conf file in order to bind mysql to specific IP and to make sure it's running under a dedicated account e.g. mysql
bind-address =
user = mysql

Collapse -

Secure MySQL with SSL certs

by gparsons In reply to Secure a MySQL database

I've been pouring over the documentation for MySQL lately and discovered you can secure connections to the MySQL database with SSL certificates.

Since you can sign your own SSL cert, this can be a no cost solution.

See the tonline documentation for MySQL at

Related Discussions

Related Forums