Background: I have a 3rd party developer for whom we have created a login into our SQL Server with the minimal permissions required for them to do their work. We gave them "deny datareader" and "deny datawriter", though we granted them execute permissions on the two stored procedures which they require.
Issue: It was brought to my attention that certain holes in our setup will be vulnerable to this new user, should they want to act maliciously. We have access from this server to various other SQL Servers via linked servers. The logins to the remote servers aren't using the users login (login as self is false), rather, we have linked server logins. Hence, should they come across the names of the linked servers they'd be able to have unfettered access to the linked servers. I did revoke access to "sp_linkedservers" to the role "public" in order to prevent them from seeing the list.
Question: Until we rectify the situation with the linked servers, is there a way for us to patch this hole? Something like denying access to linked servers would be nice, though from what I understand it would be impossible... any help would be greatly appreciated!
Disclaimer: While I don't suspect this user of malicious behavior, I do want to prevent the possibility, while at the same time learning another part of SQL Server permissions.
Thanks so much!!
~Eli