We will cover the various tips and techniques for authentication and security management in MySQL 8.0.
Tips and techniques
Restricting or disabling remote access to the server
Determine whether MySQL would be accessed from its own server or over the network.
Make sure that there is a set of defined hosts and that only they have permission to remotely access the server. There are several ways to do this, such as by using a firewall software, or iptables, or even TCP wrappers. Hardware devices that are available on the market are a viable alternative as well.
You can restrict MySQL's ability to open network sockets. To achieve this, in the my.cnf or my.ini file, add the following parameter in the [mysqld] section:
skip...