What mitigation strategy can an application use to defend against SQL injection attacks?
- Validate user-supplied input data.
- Implement security controls that block SQL traffic.
- Run web applications only on Windows SQL servers.
- Restrict SQL deployments to MongoDB Non-relational database management systems (DBMS).
Explanation & Hint:
The most effective mitigation strategy an application can use to defend against SQL injection attacks is to “Validate user-supplied input data.” Validating input data involves checking, sanitizing, and/or escaping user inputs to ensure that they do not contain SQL code that could be executed by the database. This is a crucial part of a defense-in-depth approach to security and can significantly reduce the risk of SQL injection attacks. Proper input validation ensures that only appropriately formatted data is accepted, thereby preventing malicious SQL code from being injected into the database through user inputs. The other options are not as directly effective or relevant in defending against SQL injection:
|