Database Auditing Essentials.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Database Auditing Essentials.Pdf Database Auditing Who did what to which data when and how? INTELLIGENCE. INNOVATION. INTEGRITY Authors This presentation was prepared by: Craig S. Mullins Corporate Technologist NEON Enterprise Software, Inc. 14100 Southwest Freeway Sugar Land, TX 77479 Tel: 888.338.6366 Fax: 281.207.4973 E-mail: [email protected] This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document contains information that is proprietary and confidential to NEON Enterprise Software, which shall not be disclosed outside or duplicated, used, or disclosed in whole or in part for any purpose other than to evaluate NEON Enterprise Software products. Any use or disclosure in whole or in part of this information without the express written permission of NEON Enterprise Software is prohibited. © 2006 NEON Enterprise Software (Unpublished). All rights reserved. INTELLIGENCE. INNOVATION. INTEGRITY Agenda Emergence of Enterprise Data Protection Regulatory Compliance and Auditing Database Auditing Capabilities INTELLIGENCE. INNOVATION. INTEGRITY DBA versus Data Management Database Administration Data Management — Database Security — Data Protection — Backup/Recovery — Data Privacy Protection — Disaster Recovery — Data Quality Improvement — Reorganization — Data Quality Monitoring — Performance Monitoring — Application Call Level Tuning — Database Archiving — Data Structure Tuning — Data Extraction — Capacity Planning — Metadata Management Managing the database environment Managing the content and uses of data INTELLIGENCE. INNOVATION. INTEGRITY Top Data Protection Challenges Where is my sensitive data located & who is using it? How can I enforce access & change control policies for critical databases? How do I simplify & automate compliance? INTELLIGENCE. INNOVATION. INTEGRITY Security By the Numbers (per TechTarget) 54% of companies say security budgets are growing 69% of security pros said their job will be more strategic in 2008 75% of security pros said their job will involve more compliance work 62% of security pros said their company’s top IT person will care more about security in 2008 52% said their top priority will have something to do with network/security integration 80% said they would “prefer to purchase best of breed products and integrate them into my network so I have the strongest security possible for my budget.” INTELLIGENCE. INNOVATION. INTEGRITY Database Security By the Numbers (per TechTarget) 67% of 1,100 security pros said securing databases was an important or very important challenge for 2008 — #1 in a list of 13 data protection initiatives 45% of security pros will spend more time on data protection in 2008 vs. 2007. — #3 on a list of 19 security activities 41% will spend more time on database security specifically INTELLIGENCE. INNOVATION. INTEGRITY Data Breaches According to the Privacy Rights Clearinghouse, the total number of records containing sensitive personal information involved in security breaches in the U.S. since January 2005 is: 218,198,364 As of February 5, 2008 http://www.privacyrights.org/ar/ChronDataBreaches.htm INTELLIGENCE. INNOVATION. INTEGRITY How Prevalent is this Problem? 68% of companies are losing sensitive data or having it stolen out from under them six times a year An additional 20% are losing sensitive data 22 times or more per year. Sources: eWeek, March 3, 2007 IT Policy Compliance Group http://www.eweek.com/c/a/Desktops-and-Notebooks/Report-Some-Companies-Lose-Data-Six-Times-a-Year/ INTELLIGENCE. INNOVATION. INTEGRITY Regulations Impacting Security Governance vs. Privacy Governance Privacy 1.1. Basel Basel IIII 1.1. EU EU DPDDPD 2.2. Sarbanes Sarbanes OxleyOxley 2.2. AU/NZ AU/NZ NPPNPP 3.3. OFAC OFAC 3.3. SB SB 1386/AB1386/AB 19501950 4.4. Turnbull Turnbull ReportReport 4.4. GLBA GLBA 5.5. HIPAA HIPAA 6.6. PCI PCI 7.7. FCRA FCRA ---- “Red “Red Flag”Flag” Protect and control the process Protect the data INTELLIGENCE. INNOVATION. INTEGRITY FCRA: “Red Flag” Rules All federally regulated financial institutions must be in full compliance by Nov. 1, 2008, with the so-called "Red Flag" provisions of the Fair and Accurate Credit Transactions Act of 2003 (FACTA). Part of FCRA – the Fair Credit Reporting Act. Requires that financial institutions and creditors develop and deploy an Identity Theft Prevention Program for combating ID theft on new and existing accounts. Each institution must develop a program that will: Identify relevant patterns, practices, and specific forms of activity that are "red flags" signaling possible ID theft. Include a mechanism to detect red flags identified by the program. Quickly respond to detected red flags in a way to both prevent and mitigate ID theft. Be updated regularly to reflect changes in real world risks from ID theft. INTELLIGENCE. INNOVATION. INTEGRITY Top Regulations Impacting DB Security ISO NIST CobiT PCI CMS HIPAA GLBA 17799 NERC 800-53 Audit Requirements (SOX) DSS ARS (Basel II) (FISMA) 1. Access to Sensitive Data (Successful/Failed SELECTs) 9999 9 9 2. Schema Changes (DDL) (Create/Drop/Alter Tables, etc.) 999 9 9 9 9 3. Data Changes (DML) (Insert, Update, Delete) 999 4. Security Exceptions (Failed logins, SQL errors, etc.) 99999 9 9 9 5. Accounts, Roles & Permissions (DCL) 99999 9 9 9 (GRANT, REVOKE) DDL = Data Definition Language (aka schema changes) DML = Data Manipulation Language (data value changes) DCL = Data Control Language INTELLIGENCE. INNOVATION. INTEGRITY Enterprise Data Protection Cost associated with Non-Compliance Loss/Out of Business & Breach of Data Increased Staff Fines Simplify & automate Protect enterprise data Rapidly address auditors’ compliance process requirements Tactical Strategic Need Need INTELLIGENCE. INNOVATION. INTEGRITY Regulatory Compliance and… Impact: upper-level management is keenly aware of the need to comply, if not all of the details that involves. Prosecution: prosecution can result in huge fines and even imprisonment. Cost: the cost of complete compliance can be significant. Durability: although there have been discussions about scaling back some laws (e.g. SOX), increasing regulations and therefore increasing time, effort, and capital will be spent on compliance. That is, the issue will not just disappear if you ignore it long enough! INTELLIGENCE. INNOVATION. INTEGRITY Why Audit & Secure Databases Cost of Breach Identity theft, credit cards etc. Regulatory Compliance Database monitoring is key requirement Database Leak Prevention Sensitive data needs protection Open Accessability Web 2.0 applications dissolving traditional perimeter controls INTELLIGENCE. INNOVATION. INTEGRITY Data and Database Protection, Security, and Auditing Trends ta a D f o t n u o m A Compliance Protection 0 Data Protection Issues: Accessibility Volume of data Increased accessibility of data Regulatory compliance Increased number and type of threats INTELLIGENCE. INNOVATION. INTEGRITY Database Auditing In a world replete with regulations and threats, organizations have to go well beyond securing their data. Essentially, they have to perpetually monitor their data in order to know who or what did exactly what, when and how – to all their data. Source: Audit the Data – or Else: Un-audited Data Access Puts Business at High Risk. Baroudi-Bloor, 2004. HIPAA, for example, requires patients to be informed any time someone has even looked at their data. INTELLIGENCE. INNOVATION. INTEGRITY What is Database Auditing? There are many names used for basically the same thing. I’ll call it database auditing, but you may also know it as: Data Access Auditing Data Monitoring Data Activity Monitoring (DAM) INTELLIGENCE. INNOVATION. INTEGRITY Database Auditing definition Database Auditing: The process of monitoring access to and modification of selected database objects and resources within operational databases and retaining a detailed record of the access where said record can be used to proactively trigger actions and can be retrieved and analyzed as needed. INTELLIGENCE. INNOVATION. INTEGRITY Key Stakeholder Requirements SECURITY OPERATIONS 9 Real-time policies 9 Separation of duties 9 Minimal impact 9 Secure audit trail 9 Best practices reports 9 Change management 9 Data mining & 9 Automated controls 9 Performance optimization forensics 100% Visibility & Unified View INTELLIGENCE. INNOVATION. INTEGRITY Database Auditing Types of Database Auditing Database Auditing Requirements Database Auditing Challenges Native DBMS Database Auditing? Reporting and Analyzing the Audit Data INTELLIGENCE. INNOVATION. INTEGRITY Types of Database Auditing Authorization Auditing Who can do what. Access Auditing Who did do what. Modifications: INSERT, UPDATE, DELETE Reads: SELECT Other: DDL (CREATE / DROP/ALTER), DCL (GRANT / REVOKE), Utilities, SQL errors, failed logins, etc. Replication Auditing Who copied which data where. INTELLIGENCE. INNOVATION. INTEGRITY Database Auditing Approaches What methods are available? Audit within the DBMS (traces) — Must start performance trace – Overhead as trace records are written by the DBMS — DDL changes required to traced tables? Audit from the database transaction log files — Modifications are on the log anyway so… Audit over the network — Capture SQL requests as they are sent over the network — What about non-network requests? (e.g. CICS w/DB2) Audit directly against the DBMS server (software tap) INTELLIGENCE. INNOVATION. INTEGRITY Native DBMS Audit The native DBMS audit capability may not be optimal: Separation of duties
Recommended publications
  • Integrigy Obtaining Value from Your Database Activity Monitoring Solution
    Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Stephen Kost Phil Reimann Chief Security Officer Chief Technology Officer Director of Business Development Integrigy Corporation Integrigy Corporation Integrigy Corporation Agenda How to Obtain Overview Value 1 2 3 4 DAMs & Q&A How They Work About Integrigy ERP Applications Databases Oracle E-Business Suite Oracle, SQL Server, MySQL Products Services Verify Security Assessments Validates Security Oracle EBS, Apex, OBIEE, Databases, Security AppSentry Sensitive Data, Penetration Testing ERP Application and Database Security Auditing Tool Ensure Compliance Compliance Assistance SOX, PCI, HIPAA Protects Oracle EBS AppDefend Build Enterprise Application Firewall Security Security Design Services for the Oracle E-Business Suite Auditing, Encryption, DMZ You Agenda How to Obtain Overview Value 1 2 3 4 DAMs & Q&A How They Work Security is a Process . Tools do not provide security, people do - Tools only enable and automate . Security is not provided by any one product, upgrade, or patch - Security provided by on-going lifecycle and configuration management . Database security is a process - Monitoring and auditing are only one of several components required to secure a database Database Security Program Components . An inventory of all databases and sensitive data locations Inventory . Methods and processes to maintain the inventories . A measureable database security standard and baseline Configuration . Periodic validation with compliance to the standard . Database access management policies, procedures, and tools Access . Database access profiling and monitoring . Database auditing requirements, processes, and definitions Auditing . Centralized auditing retention and reporting solution . Database real-time security monitoring and intrusion detection Monitoring . Database monitoring definition and tools .
    [Show full text]
  • Using IBM Infosphere Guardium for Monitoring and Auditing IBM DB2 for I Database Activity Ensure Compliance and Create a Tamper-Proof Audit Trail
    Using IBM InfoSphere Guardium for monitoring and auditing IBM DB2 for i database activity Ensure compliance and create a tamper-proof audit trail Kathryn Zeidenstein December 16, 2013 Mark J. Anderson (First published October 09, 2012) IBM® InfoSphere® Guardium® is an enterprise information audit and protection solution that helps enterprises to protect and audit information across a diverse set of relational and nonrelational data sources such as Oracle, Teradata, IMS, VSAM, Microsoft® SharePoint, and IBM Netezza®, and IBM DB2® for z/OS®, and DB2 for Linux, UNIX and Windows. With InfoSphere Guardium V9.0, DB2 for i can now be included as a data source, enabling you to monitor access through native interfaces and through SQL. This article provides a brief overview of the InfoSphere Guardium architecture, describes how to configure access (including best practices for performance), and describes how to access data activity reports. Overview InfoSphere Guardium is an enterprise information database audit and protection solution that helps enterprise protect and audit information across a diverse set of relational and nonrelational data sources such as Oracle, Teradata, IMS, VSAM, Microsoft SharePoint, IBM Netezza, and DB2 for z/OS and DB2 for Linux, UNIX and Windows. With InfoSphere Guardium V9.0, DB2 for i can now be included as a data source, enabling you to monitor accesses from native interfaces as well as through SQL. This article provides a brief overview of the InfoSphere Guardium architecture, describes how to configure access (including best practices for performance), and shows how to access data activity reports. A short introduction to InfoSphere Guardium The IBM InfoSphere Guardium solution evolved to address the particular needs of organizations that need to implement more automated and auditable data security practices.
    [Show full text]
  • Auditing Database Systems Through Forensic Analysis
    DePaul University Via Sapientiae College of Computing and Digital Media Dissertations College of Computing and Digital Media Summer 7-17-2020 Auditing database systems through forensic analysis James Wagner DePaul University, [email protected] Follow this and additional works at: https://via.library.depaul.edu/cdm_etd Part of the Computer and Systems Architecture Commons, and the Data Storage Systems Commons Recommended Citation Wagner, James, "Auditing database systems through forensic analysis" (2020). College of Computing and Digital Media Dissertations. 23. https://via.library.depaul.edu/cdm_etd/23 This Dissertation is brought to you for free and open access by the College of Computing and Digital Media at Via Sapientiae. It has been accepted for inclusion in College of Computing and Digital Media Dissertations by an authorized administrator of Via Sapientiae. For more information, please contact [email protected]. AUDITING DATABASE SYSTEMS THROUGH FORENSIC ANALYSIS BY JAMES WAGNER A DISSERTATION SUBMITTED TO THE SCHOOL OF COMPUTING, COLLEGE OF COMPUTING AND DIGITAL MEDIA OF DEPAUL UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPAUL UNIVERSITY CHICAGO, ILLINOIS 2020 DePaul University College of Computing and Digital Media Dissertation Verification This doctoral dissertation has been read and approved by the dissertation committee below according to the requirements of the Computer and Information Systems PhD program and DePaul University. Name: James Wagner Title of dissertation: AUDITING DATABASE SYSTEMS THROUGH FORENSIC ANALYSIS Date of Dissertation Defense: 07/17/2020 Alexander Rasin Dissertation Advisor* Boris Glavic st 1 Reader Tanu Malik 2nd Reader Jacob Furst 3rd Reader Karen Heart 4th Reader (if applicable) 5th Reader (if applicable) * A copy of this form has been signed, but may only be viewed after submission and approval of FERPA request letter.
    [Show full text]
  • Auditing the DBA in Oracle Applications: a Guide for Compliance and Audit Managers
    www.absolute-tech.com White Paper Auditing the DBA in Oracle Applications: A Guide for Compliance and Audit Managers By Cameron Larner Absolute Technologies, Inc. Copyright ©2014 by Cameron Larner Page 1 of 28 www.absolute-tech.com Table of Contents Introduction .......................................................................................................... 3 Intended Audience ................................................................................................ 3 Background ........................................................................................................... 3 Objectives ............................................................................................................. 3 DBA and Database Basics ...................................................................................... 4 DBA’s Primary Functions .................................................................................... 4 Database Objects............................................................................................... 4 Database Access ................................................................................................ 7 Database Operations ......................................................................................... 7 DBA Access to Oracle / E-Business Suite ........................................................... 8 Approaches to Auditing the DBA ......................................................................... 16 SQL Audit ........................................................................................................
    [Show full text]
  • Event Log Sql Schema
    Event Log Sql Schema Demythologized Dyson usually disforests some embranchment or exudes injudiciously. Diastyle Floyd gravitated hesitatingly, he dilutes his aerophones very discommodiously. Carson receipt plaguily? The schema changes to not tracked for all the batch of information we know how google cloud sql server express edition, log event sql schema changes from Triggering repairs at and time. Can by adding or schema acts as i did this lets us avoid using multi factor authentication, schemas in sub query, or numeric and discover all. Represents a schema in case, as a new schema by updating capture instance exec sys user as needed in different drive than others in object and log event sql schema changes event. SQL Server Audit Log Events after Translation by LOGbinder for SQL Server. The login i will be avoided unless absolutely necessary event log sql schema changes can configure log is not available disk crash, is not available inside ddl from? Supported pipeline types Data Collector The SQL Server CDC Client origin processes data in Microsoft SQL. There are ignored by your own advantages to. You enable allow throttling of business. Microsoft SQL Server is a relational database management system developed by Microsoft. Kafka connect service to make sure to record in a file, with additional documentation, availability in this category to execute all kinds of etl. One breach the assumptions that I would interest you to reconsider is telling you need want and have different tables for each event either or if over these event types are. The kettle table shows the schema for the event_data and event_data_historical database tables.
    [Show full text]
  • Mcafee Real-Time Database Monitoring, Auditing, and Intrusion
    White Paper McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention Table of Contents Introduction 3 Existing Components of Database Security 3 Authentication and access control 3 Native database audit tools 4 The Network Approach to Database Activity Monitoring 4 The local access challenge 4 The encryption challenge 6 McAfee Database Activity Monitoring: Real-Time Database Monitoring 7 and Intrusion Prevention Unique advantages 11 2 McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise’s most valuable information assets, but in most organizations today, they are poorly protected. It’s good common sense to secure databases as well as or better than other systems in the enterprise. But it’s not that simple. In this white paper, we take a look at the shortcomings of the database security tools used by enterprises worldwide and the technology and approach required to provide real-time, comprehensive protection for all types of databases. Components of Database Security A wide array of technologies and tools are currently used to provide various aspects of database security. As with other areas of IT security, no single tool can provide an ironclad defense against all threats and abuses. It’s best to implement a combination of tools to achieve adequate security. The two main categories of tools in use across enterprises large and small are authentication/access “I hack, I ruin, I make piles of control and native database audit tools. money.” Authentication and access control —Andrew Auernheimer The ability to designate roles, logins, and passwords is the most basic and most widely used level of (Charged in US Federal Court with database security.
    [Show full text]
  • Agent Based System for Realtime Database Audit Monitoring
    UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING AND INFORMATICS AGENT BASED SYSTEM FOR REALTIME DATABASE AUDIT MONITORING BY BONIFACE AKUKU P58/73079/2009 SUPERVISOR MR. CHRISTOPHER MOTURI August 2011 A research report submitted in partial fulfillment for the requirements of Master of Science in Computer Science University of NAIROBI Library 0439225 4 Table of Contents Table of Contents........................................................................................................................................ „... ii Abstract............................................................................................................................................................. iii Dedication......................................................................................................................................................... iv Acknowledgement..............................................................................................................................................v Declaration........................................................................................................................................................ vi Abbreviations...................................................................................................................................................vii List of Tables...................................................................................................................................................viii List of Figures...................................................................................................................................................ix
    [Show full text]
  • A Conceptual Framework of Information Security Database Audit and Assessment in University Based Organization
    A CONCEPTUAL FRAMEWORK OF INFORMATION SECURITY DATABASE AUDIT AND ASSESSMENT IN UNIVERSITY BASED ORGANIZATION MUNEEB UL HASAN A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Science (Information Security) Faculty of Computing Universiti Teknologi Malaysia MAY 2018 iii In the name of ALLAH, the Most Gracious and the Most Merciful To my beloved father and to my beloved mother may ALLAH bless them both who made me see further by standing on their shoulders, and to all my family and friends. Thank you. iv ACKNOWLEDGEMENT First and foremost, I would like to express heartfelt gratitude to my supervisor Dr. Siti Hajar Othman for his constant support during my study at UTM. She inspired me greatly to work in this project. Her willingness to motivate me contributed tremendously to our project. I have learned a lot from her and I am fortunate to have her as my mentor and supervisor Besides, I would like to thank the authority of Universiti Teknologi Malaysia (UTM) for providing me with a good environment and facilities such as Computer laboratory to complete this project with software which I need during process. Last but not the least, deepest gratitude goes to my beloved family members for their endless love, prayers and encouragement and to everyone who has been involved in this project even by coincidence. v ABSTRACT Today, databases are one of the most important things in the IT world and it is also becoming more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access and elasticity of IT services.
    [Show full text]
  • Accelerate Your Database Activity Monitoring Readiness to Comply with Reserve Bank of India (RBI) Guidelines
    Accelerate your Database Activity Monitoring readiness to comply with Reserve Bank of India (RBI) Guidelines June 2020 | Version 20.01 Copyright © 2020, Oracle and/or its affiliates PURPOSE This technical white-paper provides an overview of Database Activity Monitoring requirements for compliance with the RBI Guidelines on Cyber Security. The white-paper is intended to help you accelerate your readiness to RBI compliance for Database Activity Monitoring requirements by leveraging Oracle Database’s native auditing feature, and Oracle Audit Vault and Database Firewall (AVDF) product. INTENDED AUDIENCE Intended audience would include key stakeholders like CIOs, CISOs, Executive Directors, business unit heads, heads of internal audit, operational risk, compliance and fraud management from all of the financial institutions regulated by RBI in Indian sub-continent. If you are responsible for designing, implementing, maintaining, or operating security controls for database systems, this paper is intended for you to help accelerate compliance with RBI guidelines on Database Activity Monitoring requirements. DISCLAIMER This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. This document is for informational purposes only and is intended solely to assist you in planning for the implementation and upgrade of the product features described.
    [Show full text]
  • Using Oracle Data Safe
    Oracle Cloud Using Oracle Data Safe E92975-42 June 2021 Oracle Cloud Using Oracle Data Safe, E92975-42 Copyright © 2019, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • DB2 LUW Database Auditing
    Who's Knocking at Your Door? DB2 LUW Database Auditing Melanie Stopfer IBM Software Group Session Code: G15 10:30-11:30 AM May 18, 2012 | Platform: DB2 LUW Melanie Stopfer is a Consulting Learning Specialist and Developer for IBM Software Group. As a Certified DB2 9.7 Advanced Technical Expert and Certified Learning Facilitation Specialist, she has provided hands-on in-depth technical support to customers specializing in both data warehouse and transaction systems. She has worked with development labs and worldwide customers to provide DB2 solutions since 1988. She has received numerous awards for development and implementation of DB2 recovery, performance, administration and database upgrade and migration best practice solutions In 2009, Melanie was the first DB2 LUW speaker to be inducted into the IDUG Speaker Hall of Fame. She was named best overall speaker in 2012 and Top Ten Speaker at IDUG NA 2011, 2010, 2009, 2008, 2007,and IDUG EMEA 2011, 2010, 2009, 2008 and 2007. 1 Click to edit Master title style 2 Objectives • Describe the tasks for DB2 database auditing performed by the SYSADM user • List security administration tasks for DB2 databases that require the SECADM database authority in performing database level audits • Utilize the db2audit command in implement instance level auditing and to configure the audit data and archive locations • Create audit policies to enable collection of specific categories of audit data for a DB2 database • Assign audit policies to selected tables, users or database roles using the AUDIT statement • Understand auditing authority requirements Learn the configuration and management tasks required for implementation of DB2 instance or database level auditing.
    [Show full text]
  • Database Activity Monitoring Is Evolving Into Database Audit and Protection
    14.01.13 Database Activity Monitoring Is Evolving Into Database Audit and Protection Database Activity Monitoring Is Evolving Into Database Audit and Protection 22 February 2012 ID:G00230083 Analyst(s): Jeffrey Wheatman VIEW SUMMARY Database security concerns, regulatory requirements and expanded vendor capabilities are driving the emergence of a class of technologies that Gartner now identifies as database audit and protection tools. Database activity monitoring tools are transforming into DAP suites. Overview EVIDENCE Database audit and protection (DAP) represents an important evolutionary advance from earlier More than 100 client inquiries have indicated a shifting database activity monitoring (DAM) tools. Security managers, database administrators (DBAs) and other set of requirements — moving from basic monitoring stakeholders who are concerned with protecting sensitive data in databases should evaluate these to more advanced needs such as discovery, prevention increasingly mature suites. and vulnerability management. Vendor briefings and other discussions with vendors have indicated aggressive road maps with expanded capabilities for Key Findings the short term, midterm and long term. Enterprises are increasingly concerned with database security as they grapple with repositories containing huge and growing amounts of regulated and otherwise sensitive or critical data. The DAP market continues to mature, with vendors expanding their offerings and targeting a broader range of use cases. However, it is not yet clear whether enterprises will be willing or able to adopt some of the more advanced functions of DAP. Many enterprises do not possess the necessary program maturity, resources and skills to implement some of the more sophisticated DAP features that are becoming available. Legal and regulatory compliance drivers are still the most prevalent drivers for DAP investments, and Gartner expects this to be the case through the midterm.
    [Show full text]