SlideShare uma empresa Scribd logo
1 de 32
Database Security – Is Your Data At Risk? RegineDeleu – Senior Technical Presales Consultant +353 180 39481 March 2010
Agenda Some Statistics Where threats come from &How to prevent them? Demo Q&A
Agenda Some Statistics Confidential Data Data Security Risks Confidential Data Breaches Some Examples Where threats come from &How to prevent them? Demo Q&A
Confidential Data ESG – Enterprise Strategy Group
Confidential Data
Data Security Risks
Confidential Data Breaches
Confidential Data Breaches
Data Breaches – Some Examples
Data Breaches – Some Examples
Data Breaches – Some Examples
Data Breaches – Some Examples
Data Breaches – Some Examples
Data Breaches – What is the Future?
Data Breaches – What is the Cost?
Agenda Some Statistics Where threats come from &How to prevent them? Threats An Overview Outside Threats Inside Threats Demo Q&A
Threats ,[object Object]
Authenticated misuse
Malicious attacks
Inadvertent mistakes
 Outside Threats:
Hacker
External Virus
Malfunctioning Client Apps
Inside Threats:
Tester or Developer
DBA or other Authorized Users
Internal Virus
Malfunctioning Server Apps,[object Object]
What is a digital identity?

Mais conteúdo relacionado

Mais procurados

Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
TechWell
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
Mike Saunders
 

Mais procurados (20)

Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Building an InfoSec RedTeam
Building an InfoSec RedTeamBuilding an InfoSec RedTeam
Building an InfoSec RedTeam
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven cultureHow to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven culture
 
Ht t17
Ht t17Ht t17
Ht t17
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
 

Destaque

Jumalad, rituaalid..
Jumalad, rituaalid..Jumalad, rituaalid..
Jumalad, rituaalid..
guest2a25f0e
 
Jumalad,rituaalid..
Jumalad,rituaalid..Jumalad,rituaalid..
Jumalad,rituaalid..
guest2a25f0e
 
Nikko Slide Show
Nikko Slide ShowNikko Slide Show
Nikko Slide Show
guestdebfe9
 

Destaque (14)

Regine Deleu’s Art Paintings - Oil & Arcylic
Regine Deleu’s Art Paintings - Oil & ArcylicRegine Deleu’s Art Paintings - Oil & Arcylic
Regine Deleu’s Art Paintings - Oil & Arcylic
 
Echando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New YorkEchando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New York
 
Budget Plan
Budget PlanBudget Plan
Budget Plan
 
Online Emea Owl Event
Online Emea Owl EventOnline Emea Owl Event
Online Emea Owl Event
 
Jumalad, rituaalid..
Jumalad, rituaalid..Jumalad, rituaalid..
Jumalad, rituaalid..
 
Numbers 1 to 100
Numbers 1 to 100Numbers 1 to 100
Numbers 1 to 100
 
Perfect Patch
Perfect PatchPerfect Patch
Perfect Patch
 
Bethune's Daughters: Women Architects from Buffalo, NY
Bethune's Daughters: Women Architects from Buffalo, NYBethune's Daughters: Women Architects from Buffalo, NY
Bethune's Daughters: Women Architects from Buffalo, NY
 
Jumalad,rituaalid..
Jumalad,rituaalid..Jumalad,rituaalid..
Jumalad,rituaalid..
 
Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?
 
Newlywed Project at The Buffalo History Museum
Newlywed Project at The Buffalo History MuseumNewlywed Project at The Buffalo History Museum
Newlywed Project at The Buffalo History Museum
 
Mem 644 power
Mem 644 powerMem 644 power
Mem 644 power
 
History Preschool Education Philippines
History Preschool Education PhilippinesHistory Preschool Education Philippines
History Preschool Education Philippines
 
Nikko Slide Show
Nikko Slide ShowNikko Slide Show
Nikko Slide Show
 

Semelhante a Database Security

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

Semelhante a Database Security (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches3 Perspectives Around Data Breaches
3 Perspectives Around Data Breaches
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Unit-I PPT.pptx
Unit-I PPT.pptxUnit-I PPT.pptx
Unit-I PPT.pptx
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Security Review of Software (Asset Management)
Security Review of Software (Asset Management)Security Review of Software (Asset Management)
Security Review of Software (Asset Management)
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
The UX of Data Security Intelligence
The UX of Data Security IntelligenceThe UX of Data Security Intelligence
The UX of Data Security Intelligence
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
CIO WaterCooler Focus: GDPR Jasmit Sagoo
CIO WaterCooler Focus: GDPR   Jasmit SagooCIO WaterCooler Focus: GDPR   Jasmit Sagoo
CIO WaterCooler Focus: GDPR Jasmit Sagoo
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 

Database Security

Notas do Editor

  1. ESG – Enterprise Strategy Group – conducted a survey amongst 180 organisations regarding their Database Security policies, experiences, and strategies.
  2. One of the questions was:Which of the following types of data repositories would you say contain the largest percentage of your organization's confidential data?5% is stored in general purpose devices such as desktop, PDA, Laptop9 % is kept in emailsAnother 28% is stored in file servers or web serversBut most of them are stored in Databases
  3. Another questions that flew out of the first one was: Approximately what percentage of your organization's databases contain instances of confidential data?1% Didn't know4% thought that less than 10%But the rest said it was 10% or moreThis means that almost ALL databases contains some sort of confidential data which needs to be secured.
  4. Another intresting point was to see what they thought where the security risks to be concerned about. The most important once were:An insider attack by someone with "root" access to the database or serverA logical attack on a Web-facing application connected to a databaseA database containing confidential data that IT/security is not aware ofA mis-configured databaseA vulnerable database that has not been patched
  5. If organisations know the risks, that means they have suffered already some kind of breach to some extent, so the next questions were:- To the best of your knowledge, has your organization suffered a confidential data breach within the last 12 months?40% said they haven’t suffered any confidential breaches5 % were either not sure or they didn’t knowBut 55% had suffered one or more confidential breaches in the last 12 monthsWhich is very high!
  6. Another questions about breaches was: Has your organization failed a security compliance audit within the past three years? 11% Didn't know, couldn’t answer because of confidentiality51% said they had everything under control and didn’t failed any compliancy audit. Which is very good news for all of us who have confidential data stored somewhere, and we all do.But 38% had at least failed once for their audit.Those last two results, meaning the 55% data breaches and the failing of security compliances is a bit worrying.
  7. Let me give you some examples:TJX a big retailer company had several data breaches between 2005-2007, where multiple hackers could get their hands on 45.6 million credit and debit cards numbers.It cost then around $5 million to seal the breaches, contact all bank companies to block all the accounts and reissue new accounts for their customers.There has been sevelar lawsuits against TJX.But the overall damage it did to TJX itself is uncurrable because of the damage to their name.
  8. Another example, but more recent is the Heartland data breach. Heartland is a provider of credit and debit processing services.Intruders had broken into their system and planted a malicious software to steal card data.
  9. Here we have the Transportation Security Administration who inadvertently posted their airport screening procedures on the net.It contained detailed information on how they screened, what the tolerance setting are, which countries to screen for specific substances, and so on…
  10. A hard drive went missing from the Health Net, a Health Insurance company, with 7 years of medical information on it from about 1.5 million customers, all unencrypted. Besides the medical information it also contained addresses, social security info, and other info.
  11. A last one comes from the US Government itself that mistakenly posted a list of their nuclear plants with detailed desctiprions of their assests and activities.
  12. This is a report from Jan 2010 which shows stagering numbers on malicious attacks over the last years. Last year the numbers doubled, meaning that 1 out of 4 companies have suffered an attack!¾ companies attacked and from those, 36% caused efficient damage.
  13. The cost of such an attack is an average of almost $7 million.
  14. Before we can start with any kind of preventions, we need to know where the threats are coming from.
  15. We can categorize threats into 3 groups: Authenticated misuseMalicious attacksInadvertent mistakes made by authorized individuals or processesThese activities can be caused by: Outside threats: Hacker, Virus, Malfunctioning client application Inside threats: Tester, Developer, DBA and other authorized users, and Malfunctioning Server Application
  16. First I give an overview of an IT Infrastructure. So we have:The users, who access an application via a browserThe applications who run on the application servers in a grid structureThese applications request, update, create data via instances of the databasesAnd the databases are stored on disksWe also have testers and developers who use a test/development environmentThe DBA who has the authorization to maintain the database grid and storageThere can also be a system administration who has the privilege to manage the whole infrastructureAnd the Application Administrator who is in charge of the applicationsThese can all be different persons, or even multiple people for one position, but it can also be one person for several roles.
  17. Let’s start with the outside threats: a hacker could:Steal an identityIntercept a transaction and put a virus on the application servers A malfunctioning application could have a bug which produce spam or wrong data
  18. A hacker could deepter and also spam your database or in the worst case format your disks.
  19. How can we know who is who? Personal identifications can take many different forms. In the physical world we have driver licenses, travel passports, employee cardkeys. In the digital world it is not always that clear. Identification in the digital world means that one or more digital objects uniquely identify a person or application. It consists of the following parts: You have the identifier . This is a piece of information that uniquely identifies a subject, can be an unique number, but it can also be an email address. Then you have the credentials.  Private or public data that is used to prove authenticity of an identity. For example, a password. A private key and the associated public key certificate is another example.The core attributes help describe the identity. They may be used across a number of applications. For example, addresses and phone numbers.And then we have the application or business specific attributes . That data helps describe the identity in a certain context. For example, within an HR application, the employee's preferred health plan information is a application specific attribute.All this information can be protected by an Identity and access management framework, which contains beside managing and monitoring identities, also SSO, trust and federation functionalities, user entitlements, auditing, directory services, and others.
  20. Then we have our inside threats.A tester or developer could access the production or standby environment and view or even modify data. Also authorized personal can view unsecured data. Think about your bank account be accessable by anyone who works for a company you have given your details to.
  21. Access, roles and database authorization can be controled by DB Vault.For instance a App Admin should not be allowed to see data from Finance or HR applications, but should be allowed to see and manipulate (to a certain degree) data from other applications. Also a HR person should not be allowed to have access to the Finance data and visa versa.Database Vault helps organizations address these issues. - It restricts privileged users from accessing application data. - It protects databases and applications from unauthorized changes. - It enforces strong controls over who, when, and where applications can be addressed. - And it helps to address regulatory compliance, insider threats, and protection of personally identifiable information.
  22. Another level of security is label security. We use sensitivity labels, such as public, confidential and sensitive. These sensitivity labels can be assigned to users in the form of label authorizations and associated with operations and objects inside the database.In our example you see that the DB Admin has a confidential level to the table, which allows him or her to access most but not all of the rows. Then we have the Application Administrator who only has a public level of access and can onlu see 2 out of 4 rows. But the CFO has the highest level and therefore is allowed to see all the rows.
  23. A lot of companies use production data for testing. What if we copy sensitive data from production to test. Then that data is again viewable for tester or developer.
  24. Here comes encryption into play. Data masking is the process of obscuring or masking specific data elements within databases. The goal is that sensitive customer information is not available outside of the authorized environment. Data masking is typically done while provisioning non-production environments so that copies created to support test and development processes are not exposing sensitive information.As you can see here parts of the data in the test environment is masked so that the tester sees other data. It can be formatted the same way as the production data.
  25. An extra option is the Advanced Security which combines database encryption, network encryption, and strong authentication to help customers address privacy and compliance requirements and to ensure their data against hackers who want to intercept, modify, and divert their data. - There is Transparent Data Encryption which provides an easy and effective protection of stored data by transparently encrypting data. - We have Network Encryption. When information travels to and from the Database.- And it provides a Strong Authentication. Passwords alone are often not secure enough, and are known for their high TCO or Total Cost of Ownership. Two-factor or "strong" authentication is based on something the user has (a smart card, token, etc.) and something the user knows (a PIN or pass code) to secure data.
  26. How can we manage and monitor all of this?Audit Vault collects all the necessary information in an automated way. You can monitor all kind of access to your data, generate reports, or create security keys.It regulates compliances and so mitigate the risks associated with inside threats.