
When it comes to securing MySQL databases, most organizations are focused on encryption, firewalls, and authentication layers. But there’s one glaring risk that’s often overlooked: open ports. Even with all the right tools in place, an exposed port gives hackers a doorway into your infrastructure. That’s where SSHepherd comes in—completely eliminating the database attack surface while keeping authorized access intact.
In this blog, we’ll break down how hackers typically exploit MySQL databases, and how SSHepherd prevents them from even discovering your systems in the first place.

The Problem: Open Ports Invite Attacks
Let’s say your organization runs a public-facing website for a medical clinic. This website connects to a backend MySQL database that stores sensitive patient records. You’ve implemented multi-factor authentication, SSL/TLS encryption, and a hardened firewall. But your MySQL database still has an open port so the website can talk to it.
From a Zero Trust perspective, this is a serious vulnerability. Zero Trust assumes the adversary is already inside the network—gained access through phishing, weak passwords, misconfigurations, known CVEs, or insider threats. Once inside, the attacker begins reconnaissance, usually starting with network scans using tools like Nmap or Zenmap.
With an open port exposed, the attacker can:
- Identify the OS and services running
- Cross-reference service versions with known vulnerabilities
- Attempt brute-force logins or credential stuffing
- Launch SQL injection attacks
- Extract or corrupt data
- Execute DDoS attacks to crash the database
Simply put, an open port is like a neon sign that says: “Here’s where the data lives.”
The Solution: SSHepherd Closes the Port, Keeps the Tunnel
SSHepherd is designed to flip the model on its head. It lets you close all database ports—even to internal traffic—while still allowing secure, authorized communication between apps and services.
In our demo, a public-facing website (hosted on Apache) connects to a MySQL database hosted in Azure. The site, accessible at medportal.sshepherd.us, is fully functional. The backend database is storing live patient data. But when we scan the database VM using Zenmap or Nmap, it’s invisible. No open ports. No exposed services. No attack surface.
How? SSHepherd creates a secure, ephemeral tunnel that only authorized applications or users can access. From the attacker’s perspective, the SQL server doesn’t exist. There are no logs, no alerts, and no lateral movement paths to pivot deeper into your infrastructure.
Why SSHepherd Matters for Your MySQL Security
Here’s what makes SSHepherd a must-have in a Zero Trust architecture:
- Closes listening ports: Removes visibility from reconnaissance scans.
- Prevents lateral movement: Hackers can’t move from host to host if they can’t see them.
- Reduces alert fatigue: No port scans, no false positives, no unnecessary log clutter.
- Integrates with your stack: Works alongside MFA, encryption, and firewalls to add another critical layer of protection.
SSHepherd transforms the security posture of your MySQL databases. It doesn’t just harden them—it makes them disappear.
See It in Action
Want to watch the full demo? Check out our YouTube video where we walk through a real-world scenario of a protected MySQL database:
Protect More Than MySQL
SSHepherd isn’t limited to databases. It can protect any TCP/IP service, including RDP, SSH, HTTPS, and custom apps. If you’re ready to stop playing whack-a-mole with vulnerabilities and start eliminating your attack surface, SSHepherd is your next move.
Visit us at www.fullarmor.com to learn more or request a free demo.