I was recently asked about securing SQL Server Integration Services, and I knew next to nothing about it. After digging in for a while, here are my notes, mostly for myself, but shared in case they might help someone else.
There are 3 areas that need to be secured:
The SSIS Engine
Protecting the SSIS Engine
Ensure file-based Access Control List (ACL) permissions are restricted on the SSIS executable (MsDtsSrvr.exe)
Use a security tool to monitor for changes to the executable.
Limit Windows administrator accounts on the SSIS server.
Protecting SSIS Packages
Ensure file-based Access Control List (ACL) permissions are restricted on dtutil.exe.
Store packages in a hardened instance of SQL Server (SQL Server stores them in the msdb system database).
I haven’t thought of any reason why someone would have to store packages on a file system, but if you must, then set file-based Access Control List (ACL) permissions on the packages.
You can store packages in the “Package Store” which uses the file system with permissions managed by SSIS. I haven’t found any detailed documentation for this, but I expect that storing packages in SQL Server is safer, if SQL Server has been hardened.
Set the Package Protection Level (PPL) on each package, regardless of where you store them.
Limit SQL Server permissions to manage SSIS packages.
The Package Protection Level allows you to determine the package protection method and scope.
As for the method, you can choose not to save sensitive data, encrypt only the sensitive data, encrypt all data in the packages (not the data that the packages operate on), or let Windows ACLs protect the entire package. Sensitive data is connection string passwords, some tagged nodes, and some SSIS variables (see
). If you encrypt all data in the package, it will protect hide the logic of the operations, and the server and database sources and targets, in addition to the sensitive data.
The PPL scope allows you to encrypt with a user key or password. If you use a user key, only the user who creates or exports the package can open or run the package. When a package has passed the testing phase, the production team can re-encrypt a package with a maximum-strength password.
Package Protection Levels:
Do not save sensitive data
Encrypt sensitive data with user key
Encrypt sensitive data with password
Encrypt all data with user key
Encrypt all data with password
Rely on server storage and roles for access control
If, and only if, you store SSIS packages in SQL Server, then permissions to manage and run the packages are given only to and through these SSIS database-level roles: db_ssisadmin, db_ssisltduser, and db_ssisoperator. These roles are assigned to a package using SSMS, and they're saved to the msdb system database.
Connecting to the SSIS engine provides the ability to:
Check running packages
Store packages in MSDB or on a file system
Set Reader and Writer roles on packages
Protecting SQL Server against Rogue Packages
Harden SQL Server
Set BlockedSignatureStates to require valid, trusted digital signatures to run any package
The first line of defense against rogue packages is the credentials under which a package makes connections to databases. If SQL Server is hardened to a standard such as the DoD’s Database STIG, an SSIS package should be unable to read or harm any data that the connection credentials don’t have the authority for.
By default, any user who connects to SSIS via SQL Server Management Studio (SSMS) can see a list of packages, all storage locations, and which of their packages are running. This can be prevented by removing execute permissions on the dts enumeration stored procedures (e.g. sp_enum_dtspackages) from the public role (see
). SQL Server system administrators can see all running packages regardless of other permissions.
SQL Server Management Studio uses the SQL Server service to list running packages. Members of the Windows Administrators group can view and stop all currently running packages. Users who are not members of the Administrators group can view and stop only packages that they started.
As always, if anyone has any suggestions, I’d love to hear them!