September 28, 2006 at 1:32 pm
While not directly a SQL Server issue, here's my dilemna. I have a requirement (a government regulation, not something I can change) to be able to extract records from a SQL2K table to a file and have that file be read-only. Basically, this is an application's system log table and the read-only requirement is so that someone can't manually manipulate the archived log entries. Any thoughts? TIA... Steve
September 28, 2006 at 1:45 pm
Use NTFS permissions and allow the file to be only read (not delete, modified, moved..). Make sure only the server and administrators can access it.
September 28, 2006 at 1:48 pm
Export to PDF and disable print and copy of the file properties and there is more you can add including password protecting. Hope this helps.
Kind regards,
Gift Peddie
September 28, 2006 at 2:01 pm
Gift Peddie... the problem with that approach is that PDF requires a security password be set. You also have to confirm the password, so you can't just hit a bunch of keys. If someone knows the password, they can re-open the document, remove security, and modify the document. My requirement is for the file to be permanently read-only for everyone (admins included).
Same issue WRT the NTFS permission idea -- if someone can reset the permissions, that won't work.
September 28, 2006 at 2:11 pm
I don't think there's any way of making this totally read only. There's always someone who's gonna have to have access to that file (like the server).
There's one other way however >> Print it.
September 28, 2006 at 2:40 pm
Export to Excel or Word save as HTML. Hope this helps.
Kind regards,
Gift Peddie
September 28, 2006 at 2:50 pm
Same problem... just access the source file and edit.
September 29, 2006 at 2:53 am
There is no such thing as 100% security - you just can make it more or less difficult for someone to break.
However you do it, if you add a checksum, at least you know if its been tampered (but somebody theoretically could reproduce the checksum). Also, you could have two or three copies encrypted differently and an app to read them. Tampering would have to break the multiple encryptions and change everything to match. How far do you want/need to go?
September 29, 2006 at 3:50 am
NTFS permissions are definitely the way to go. Only trusted personnel should be able to make changes to the permissions, and hence be able to make changes to the file. For all other personnel, the file will be read only. Digitally signing the file will allow you to track whether anyone does make any changes, so that even a trusted person won't be able to change it without someone knowing. There are practical limits to ANY security system, and trusted personnel are an intrinsic and inescapable part of those limits.
September 29, 2006 at 3:52 am
Alternatively, get someone to password protect it, don't let them tell anyone the password, and then kill them Might be considered a little on the extreme side though...
September 29, 2006 at 3:57 am
Thre's always physical security. Stick it on a CD rather than a network drive. Keep a copy locked in a safe for comparison.
September 29, 2006 at 6:40 am
I think I like Ian's last suggestion. We'll hire a contractor and tell them it's for a "short term" position. 🙂 Thanks everyone for the suggestions. I'll offer up these ideas and let management decide what they want to do.
October 6, 2006 at 5:26 pm
There is one problem with that I experienced it so I know we had a 500 pages use case document the developers and the business team have read and write access to the file I tried to check it out one day and it says it was already checked out by my userID so I checked and found out it was checked out by another developer. Word files caches userID.
Kind regards,
Gift Peddie
Viewing 13 posts - 1 through 12 (of 12 total)
You must be logged in to reply to this topic. Login to reply