One Step Closer To Making Data Breaches a Thing of the Past

Size: px
Start display at page:

Download "One Step Closer To Making Data Breaches a Thing of the Past"

Transcription

1 One Step Closer To Making Data Breaches a Thing of the Past Ernie Mancill, IBM

2 Please note IBM Software Group Information Management software IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about IBM potential Software future products Group may Lotus not be incorporated software into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.

3 Business Landscape and current Threats 3

4 Database Servers - The Primary Source of Breached Data All Others Laptops and Backups Desktops Database Servers Although much angst and security funding is given to offline data, mobile devices, and end-user systems, these assets are simply not a major point of compromise. up from 75% in 2009 Data Breaches Database Servers 96% All Others 2% Laptops and Backups 1% Desktops 1% Data Breach Investigations Report 2011 Data Breach Report from Verizon Business RISK Team Source: 4

5 Why? Database servers contain your most valuable information Financial records Customer information Credit card and other account records Personally identifiable information High volumes of structured data Easy to access Because that s where the money is. - Willie Sutton 5

6 Database Danger from Within Organizations overlook the most imminent threat to their databases: authorized users. (Dark Reading) No one group seems to own database security This is not a recipe for strong database security 63% depend primarily on manual processes. (ESG) Most organizations (62%) cannot prevent super users from reading or tampering with sensitive information most are unable to even detect such incidents only 1 out of 4 believe their data assets are securely configured (Independent Oracle User Group). 6

7 Growing Compliance Mandates Explosion in successful breaches has resulted in growing regulation of sensitive data in North America SOX HIPAA PCI DSS 46 state-specific data privacy laws Gramm-Leach-Bliley Many EU and Asian countries have enacted similar regulations EU Data Privacy Directive and supporting local laws C-SOX FIEL PCI DSS etc. 7

8 Threats to DB2 Data Privileged User access to DB2 Data from outside of DB2. Access to Linear VSAM datasets Privileged User access to DB2 Data via SQL Abuse of privilege without business Need to Know External Threats SQL Injection (Hacking) Movement of data outside of DB2 Unloads Clones Test Data Replication

9 Defense in Depth of DB2 Data First Layer - Encryption (this forces only access to clear text data must be in the form of an SQL statement) Second Layer - Database Activity Monitoring (this ensures each SQL statement is inspected, audited, and subject to security policy control) Third Layer - Audit access to VSAM linear datasets Fourth Layer - Implement business need to know control for critical data (this reduces abuse of privilege access) Fifth Layer - Protect the use of unloads and extracts for the purpose of: Test data management and generation Unloaded data for batch processes Extracts for external uses Replicated data Backup and Recovery assets

10 First Layer of Defense: Encryption 10

11 Encryption and Data at Rest Protection Key requirement for most of the popular data protection initiatives Main requirement is to protect data at rest to ensure that only access if for business needto-know, and through mechanisms which can be controlled by the native security mechanisms (such as RACF) Consider the following scenario: DB2 Linear VSAM datasets are controlled via RACF from direct access outside of DB2 via dataset access rules DBA or Storage Administrator has RACF authority to read VSAM datasets in order to perform legitimate storage administration activities. Administration privileges can be abused to read the linear VSAM datasets directly and access clear-text data outside of DB2/RACF protections. Now consider the above scenario, but with the underlying Linear VSAM datasets encrypted 21 When DBA or Storage Administrator uses their RACF dataset authorities in a manner which is outside of business need-to-know, the data retrieved is cybertext and thus remains encrypted and protected. Only way to access and obtain clear-text data will be via SQL which can be protected via DB2/RACF interface

12 Example of a table without encryption - Rows accessed via SQL

13 External print of the tablespace container showing unencrypted table and clear text exposure of data

14 Example of table with encryption enabled EDITPROC name (generated by the Encryption Tool) specified by DDL

15 Example of a table with encryption - Rows accessed via SQL and results presented to application requestor as clear-text Each SQL request will invoke the EDITPROC and result in clear-text being presented back to any AUTHORIZED requestor

16 External print of the tablespace container showing encrypted table and Cyber-text data without exposure of data

17 ICSF Interface to the Crypto Hardware z/os Appl Program (or product) ICSF Address Space ICSF Data Space Call CSF API (parms) ICSF Routines CKDS PKDS APIs Key Storage Load Balancing Security CKDS TKDS TKDS Cache PKDS

18 Key Types and Algorithms Key Types Clear Key key may be in the clear, at least briefly, somewhere in the environment Secure Key key value does not exist in the clear outside of the HSM (secure, tamper-resistant boundary of the card) Protected Key key value does not exist outside of physical hardware, although the hardware may not be tamper-resistant Encryption Algorithms TDES - Triple Data Encryption Standard (up to 192 bit key support) AES - American Encryption Standard (up to 512 bit key support)

19 Crypto Hardware for Data Encryption Clear Key z800/z900/g6 Requires a CCF zenterprise/z10 CPACF (& PCIXCC, CEX2C for CKDS)* Secure Key z800/z900/g6 Requires a CCF z890/z990 Requires a PCIXCC or CEX2 z9 Requires a CEX2C z10 Requires a CEX2C or CEX3C zenterprise Requires a CEX3C Protected Key zenterprise/z10 Requires a CEX3C

20 InfoSphere Guardium Data Encryption for DB2 and IMS Databases Existing implementation uses DB2 EDITPROC for row level encryption Application Transparent No Additional Security Table must be dropped and reloaded to add EDITPROC Indexes not encrypted User Defined Function (UDF) for column level encryption Requires changes to SQL when accessing encrypted column High overhead when accessing encrypted column, no overhead on nonencrypted columns Can secure UDF in RACF for additional security Data encrypted in place, Implementation can be less disruptive that other approaches (SQL based) DB2 Fieldproc for column level encryption Similar Characteristics to EDITPROC approach Index encryption

21 DB2 EDITPROC Restriction removal APAR PM07944/PTF UK71403 Support a new EDITPROC COLUMN INSENSITIVE clause on CREATE TABLE. Lift restrictions for the following column types: IDENTITY, XML, DECFLOAT, BIGINT, BINARY, VARBINARY, ROWID, and SECLABEL when using a column insensitive EDITPROC Note: LOB data type restriction remains in place. Lift restriction for >18 byte column names Allow the use of the ALTER TABLE statement to make certain changes to a table that already has a column insensitive EDITPROC defined. Altering a table to add a new column or alter an existing column data type, length, precision, or scale for a table with a column insensitive EDITPROC. Altering a table to add a new XML column or a SECLABEL column for a table with a column insensitive edit routine. Altering a table to rename a column for a table with a column insensitive edit routine. 21

22 DB2 Data Encryption Flow Insert / Update SQL Request Unencrypted Row Integrated Cryptographic Service Facility (ICSF) Encryption 1 SQL Insert/Update Application Storage Unencrypted Row 4 Encrypted Row Unencrypted Row B Encrypted Row 1) Key Label Application Storage DB2 Buffer Pool 6 Put Encrypted Row B Encrypted Row 6 User Key Cryptographic Key Data Set Encryption EDITPROC B Encrypted Row

23 Second Layer of Defense: Database Activity Monitoring (Auditing) 23

24 Collecting Real-Time Actionable Audit Information RACF provides control for resource access, but lacks granularity in generating audit reports DB2 Audit Trace significantly improved in V10, but still requires externalization to SMF and customer provided reporting infrastructure SMF based reporting can result in latency from event capture to subsequent reporting and actionable processing Trace based auditing tends to be complex and controlled by privileged users (DBA or SYSPROGS)

25 IBM Infosphere Guardium Integration with LDAP, IAM, IBM Tivoli SIEM, IBM TSM, Remedy,

26 Address the Full Data Protection Lifecycle Discover your DBMSs Discover & classify sensitive data Continuously update security policies Cross-DBMS policies Pre-built compliance reports (SOX, PCI, etc.) Enterprise integration SIEM integration Sign-off management Centralized audit repository No database changes Discover & Classify IBM Software Group Critical Lotus software Discover Audit & Report Classify Data Infrastructure Assess & Harden Monitor Assess & & Enforce Harden DB vulnerability assessments Configuration auditing Masking and Redaction Encryption of sensitive data Archive un-needed data Preconfigured tests based on best practices and standards Monitor & block attacks Monitor privileged users Monitor changed behavior Real-time alerts Prevent cyberattacks Detect application-layer fraud Enforce change controls Forensics data mining

27 IBM Infosphere Guardium S-TAP for DB2 on z/os Guardium z Collector Collection Profiles TCP/IP STREAMING Process S-TAP Audit Server Administration Repository DB2 Subsystem S-TAP Agent DB2 IFI Collection Auth/.CMD/ Utilities Audited Table Audited DB2 Subsystem ASC Audit SQL Collector 27

28 A Typical Collection Profile

29 Reports - Select * from US_SALES1 29

30 Reports - Inserts Values can be redacted Values can be recorded 30

31 Reports Update 31

32 Unauthorized Connections

33 4. Alerts Processed audit data can create alerts Alert on any component within the policy In this example, US_SALES1 with DML Commands

34 4. Alerts Processed audit data can create alerts

35 Third Layer of Defense: VSAM Activity Monitoring (Auditing) 35

36 Product Synopsis Software component of the InfoSphere Guardium solution Captures VSAM data set events Open, Update, Delete, Rename, Create, Alter Related RACF events (Alter, Control, Update, Read) VSAM file types (ESDS, KSDS, RRDS, VRRDS, LDS) S-TAP for VSAM sends information specified by user-defined audit policies to an InfoSphere Guardium Collector for z/os appliance Release 8.2 is initial release

37 Guardium S-TAP for VSAM on z/os Architecture Guardium Appliance Collection Policy z/os TCP/IP CONTROL DS OPTIONS S-TAP STC RULEDEFS RULEDEFB FILTER EVENT DATA AGENT SYSTEM EXITS SMF EXITS IEFU83 IEFU84 IEFU85 Audited Tables Audited VSAM VSAM

38 Monitored Data File types: ESDS, KSDS, RRDS, VRRDS, and LDS Events: DATA SET OPEN DATA SET UPDATE DATA SET DELETE DATA SET RENAME DATA SET CREATE DATA SET ALTER RACF ALTER RACF CONTROL RACF UPDATE 38 RACF READ

39 Sample Report IBM Software Group Information Management software

40 Fourth Layer of Defense: Business Need to Know access control 40

41 New DB2 10 fine grain table controls Protect against unplanned SQL access Define additional table controls at the row and column level Security policies are defined using SQL Separate security logic from application logic Security policies based on real time session attributes Protects against SQL injection attacks Determines how column values are returned Determines which rows are returned No need to remember various view or application names No need to manage many views; no view update or audit issues Mask column values in answer set All access via SQL including privileged users, adhoc query tools, report generation tools is protected Policies can be added, modified, or removed to meet current company rules without change to applications 41

42 Fifth Layer of Defense: Control of Data Movement OUTSIDE of DB2 42

43 Limit the scope of compliance and security concerns Sensitive Data Proliferation Sensitive Data Development Sensitive Data Production Sensitive Data IBM Test Software Group Backup Lotus software Sensitive Data Sensitive Data User Acceptance Sensitive Data Disaster Recovery Risk of Breach Actual risk and compliance burden = Original production data + all derived clones 43

44 Effective Test Data Management Production or Production Clone 2TB 100 GB Development Environment Create targeted, right-sized test environments instead of cloning entire production environments. Development environments are then more manageable, improving agility to deploy new functionality more quickly and with improved quality. 100 GB QA Environment OPTIM Test Data Management 100 GB Test Environment 100 GB Training Environment

45 Sensitive Data Masking Masked or transformed data must be appropriate to the context: Consistent formatting (alpha to alpha) Context and application aware Within permissible range of values Maintain referential integrity OPTIM Data Privacy A comprehensive set of data masking techniques to transform or de-identify data, including: String literal values Character substrings Random or sequential numbers Arithmetic expressions Concatenated expressions Date aging Lookup values TRANS COL Example 1 Patient Information Example 2 IBM Software Group Personal Lotus Info software Table Patient Patient No. No SSN SSN Name Name Amanda Erica Schafer Winters Address Bayberry Murray Court Drive City City Elgin Austin State State IL TX Zip Zip PersNbr FirstName LastName Jeanne Alice Bennett Renoir Claude Carl Davis Monet Pablo Elliot Flynn Picasso Data is masked with contextually correct data to preserve integrity of test data 45 Referential integrity is maintained with key propagation Event Table PersNbr FstNEvtOwn LstNEvtOwn Pablo Elliot Flynn Picasso Pablo Elliot Flynn Picasso

46 What is IBM Infosphere Guardium Data Encryption Expert? Security for your structured and unstructured data High performance encryption, access control and auditing Data privacy for both online and backup environments Unified policy and key management for centralized administration across multiple data servers Transparency to users, databases, applications, storage No coding or changes to existing IT infrastructure Protect data in any storage environment User access to data same as before Centralized administration Policy and Key management Audit logs High Availability 46

47 Data Encryption Architecture Authenticated Users Applications DBMS Server server / file File server ftp server File System SSL x.509 Certificates Web Administration DE Agent https IBM DE Server Active /Active Key, Policy, Audit Log Store Online Files Data Encryption Security Server Policy and Key Management Centralized administration Separation of duties 47

48 IBM Encryption Facility for z/os, 1.1 Licensed Program Product MSU-based pricing Requires: z/os 1.4 or higher z/os.e 1.4 or higher Feature: Encryption Services Optional Priced Feature* Feature: DFSMSdss Encryption Encryption Facility Client Web download Optional Priced Feature* Supports encrypting and decrypting of data at rest (tapes, disk) Supports either Public Key/Private keys or passwords to create highly secure exchange between partners Java technology-based code that allows client systems to decrypt and encrypt data for exchange with z/os systems Allows encryption and compression of DUMP data sets created by DFSMSdss Supports decryption and decompression during RESTORE * Variable Workload License Charges (VWLC), Entry Workload License Charges (EWLC), zseries Entry License Charges (zelc), Parallel Sysplex License Charges (PSLC)

49 Wrap up 49

50 Review - Approach Encrypting the tablespace containers will force the use of SQL to obtain clear-text data. All SQL should be subject to security controls (DB2 and/or RACF) as well as inspected for audit collection and application of Audit Policies. VSAM activity should also be subject to monitoring, in particular, any access to the DB2 Linear VSAM dataset containers outside of DB2 For specific DB2 tables, Business Need to Know controls can be implemented. Any movement of data outside of DB2 should also be controlled: Replicated Data (z/os and Open System Targets) Unloads Test Data from Production Data Recovery Assets (Image Copy and DB2 Recovery Log Archives)

51 Review - Capabilities Encryption of Data at Rest with Infosphere Encryption Tool for DB2 and IMS Databases Fine-Grain Database Activity Monitoring with Infosphere Guardium for DB2 VSAM Activity Monitoring with Infosphere Guardium STAP for VSAM Business Need to Know controls on specific tables with DB2 10 and Row filters / Column masking Control of Data moved outside of DB2: Infosphere Guardium Encryption Expert for MP Optim Test Data Management and Data Privacy Solution z/os Encryption Facility Infosphere Encryption Tool for DB2 and IMS databases Infosphere Guardium Database Activity Monitoring

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you

More information

Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan. Oracle e-business Suite. R12 Upgrade Workshop Summer 2011

Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan. Oracle e-business Suite. R12 Upgrade Workshop Summer 2011 Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan Oracle e-business Suite R12 Upgrade Workshop Summer 2011 Agenda 10:00 Welcome & Introductions Industry Implementation Challenges 10:30

More information

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions

More information

IBM InfoSphere Optim Data Masking solution

IBM InfoSphere Optim Data Masking solution IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive

More information

Best practices for protecting Enterprise Information in BigData & Datawarehouse. Anwar Ali, Senior Solution Consultant, Information Management

Best practices for protecting Enterprise Information in BigData & Datawarehouse. Anwar Ali, Senior Solution Consultant, Information Management Best practices for protecting Enterprise Information in BigData & Datawarehouse Anwar Ali, Senior Solution Consultant, Information Management Big data a growing phenomenon data every day 12+ TBs of tweet

More information

Real-Time Database Protection and. Overview. 2010 IBM Corporation

Real-Time Database Protection and. Overview. 2010 IBM Corporation Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

<Insert Picture Here> Oracle Database Security Overview

<Insert Picture Here> Oracle Database Security Overview Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

DB2 Security and PCI Compliance

DB2 Security and PCI Compliance DB2 Security and PCI Compliance A BEST PRACTICES GUIDE Ulf T. Mattsson, Chief Technology Officer, Protegrity Corporation. INTRODUCTION THE PAYMENT CARD INDUSTRY (PCI) DATA SECURITY STANDARD PCI is a set

More information

Complete Database Security. Thomas Kyte http://asktom.oracle.com/

Complete Database Security. Thomas Kyte http://asktom.oracle.com/ Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright

More information

Security Functions of IBM DB2 10 for z/os

Security Functions of IBM DB2 10 for z/os IBM Information Management Software Front cover Security Functions of IBM DB2 10 for z/os Implement separation of duties Audit application and system activity Protect from intrusions and misplacements

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information

More information

Oracle Database Security Solutions

Oracle Database Security Solutions Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting Eric.cheung@oracle.com May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises

More information

Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect Becky.Albin@softwareag.com

Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect Becky.Albin@softwareag.com Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect Becky.Albin@softwareag.com Data Masking for Adabas The information provided in this PPT is entirely subject

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional

More information

Why Add Data Masking to Your IBM DB2 Application Environment

Why Add Data Masking to Your IBM DB2 Application Environment Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise

More information

Oracle Database 11g: Security. What you will learn:

Oracle Database 11g: Security. What you will learn: Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Tools for Managing Big Data Analytics on z/os

Tools for Managing Big Data Analytics on z/os Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing

More information

How To Protect Data From Attack On A Computer System

How To Protect Data From Attack On A Computer System Information Management White Paper Understanding holistic database security 8 steps to successfully securing enterprise data sources 2 Understanding holistic database security News headlines about the

More information

IM02 How to manage your Test Data on zenterprise. 18-20 September, 2012 IBM Forum Brussels

IM02 How to manage your Test Data on zenterprise. 18-20 September, 2012 IBM Forum Brussels IM02 How to manage your Test Data on zenterprise 18-20 September, 2012 IBM Forum Brussels Notices This information was developed for products and services offered in the U.S.A. Note to U.S. Government

More information

Comprehensive Approach to Database Security

Comprehensive Approach to Database Security Comprehensive Approach to Database Security asota@hotmail.com NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

Oracle Database Security

Oracle Database Security Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches

More information

Information Security & Privacy Solutions Enabling Information Governance

Information Security & Privacy Solutions Enabling Information Governance Information Security & Privacy Solutions Enabling Information Governance LYNDA KEITANY IM SALES SPECIALIST July 11, 2012 What s at Stake? Damage to company reputation Brand equity damage; negative publicity

More information

Enterprise Security Solutions

Enterprise Security Solutions Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class

More information

Auditing Data Access Without Bringing Your Database To Its Knees

Auditing Data Access Without Bringing Your Database To Its Knees Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

Best Practices. IBM Data Server Security. IBM Data Servers

Best Practices. IBM Data Server Security. IBM Data Servers IBM Data Servers Best Practices IBM Data Server Security Walid Rjaibi Senior Technical Staff Member Security Architect for DB2 LUW James Pickel Senior Technical Staff Member Security Architect for DB2

More information

An Oracle White Paper January 2011. Oracle Database Firewall

An Oracle White Paper January 2011. Oracle Database Firewall An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),

More information

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Vormetric Encryption Architecture Overview

Vormetric Encryption Architecture Overview Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Oracle Database 11g: Security

Oracle Database 11g: Security Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features

More information

All Things Oracle Database Encryption

All Things Oracle Database Encryption All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption

More information

An Oracle White Paper January 2012. Oracle Database Firewall

An Oracle White Paper January 2012. Oracle Database Firewall An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black

More information

Enterprise Database Security & Monitoring: Guardium Overview

Enterprise Database Security & Monitoring: Guardium Overview Enterprise Database Security & Monitoring: Guardium Overview Phone: 781.487.9400 Email: info@guardium.com Guardium: Market-Proven Leadership Vision Enterprise platform for securing critical data across

More information

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption

More information

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Obtaining Value from Your Database Activity Monitoring (DAM) Solution Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database

More information

Oracle Database Security

Oracle Database Security breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security

More information

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity

More information

Installing and Configuring Guardium, ODF, and OAV

Installing and Configuring Guardium, ODF, and OAV Installing and Configuring Guardium, ODF, and OAV In this appendix, we will cover the following topics: ff ff ff IBM Infosphere Guardium Database Security Oracle Database Firewall Oracle Audit Vault IBM

More information

How To Manage A Database With Infosphere Guardium

How To Manage A Database With Infosphere Guardium IBM InfoSphere Guardium Managing the entire database security and compliance life cycle Leading organizations across the world trust IBM to secure their critical enterprise data. The fact is, we provide

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Oracle 1Z0-528 Exam Questions & Answers

Oracle 1Z0-528 Exam Questions & Answers Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database

More information

DB2 for z/os Security Best Practices

DB2 for z/os Security Best Practices DB2 for z/os Security Best Practices Roger Miller IBM Silicon Valley Lab 05 October 2009 13:30 14:30 08 October 2009 11:00 12:00 Platform: DB2 for z/os Security is in the headlines and growing much more

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy

More information

8 Steps to Holistic Database Security

8 Steps to Holistic Database Security Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security

More information

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current

More information

ILM et Archivage Les solutions IBM

ILM et Archivage Les solutions IBM Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

10195 Crypto And Disaster Recovery

10195 Crypto And Disaster Recovery Crypto And Disaster Recovery Greg Boyd (boydg@us.ibm.com) Atlanta, GA Permission is granted to SHARE to publish this presentation in the SHARE Proceedings. IBM retains its right to distribute copies of

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses.

More information

Crypto and Disaster Recovery. Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com

Crypto and Disaster Recovery. Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com Crypto and Disaster Recovery Greg Boyd gregboyd@mainframecrypto.com www.mainframecrypto.com October 2014 Agenda Crypto and Disaster Recovery How Do You Do DR? Technology Hardware Domains Master Keys Restoring

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION

More information

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations rbarnes@appsecinc.com

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations rbarnes@appsecinc.com Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations rbarnes@appsecinc.com Verizon 2009 Data Breach Investigations Report: 285 million records were compromised

More information

Informatica Dynamic Data Masking

Informatica Dynamic Data Masking Informatica Dynamic Data Masking Preventing Data Breaches with Benchmark-Proven Performance WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential Information

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached

More information

Data Security: Strategy and Tactics for Success

Data Security: Strategy and Tactics for Success Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents

More information

Protecting Data-at-Rest with SecureZIP for DLP

Protecting Data-at-Rest with SecureZIP for DLP Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED

More information

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse. Presented by Richard Marko, Manager of Technical Services Sponsored by Midland Information Systems,

More information

Protecting Data at Rest with Vormetric Data Security Expert

Protecting Data at Rest with Vormetric Data Security Expert V O R M E T R I C W H I T E P A P E R Protecting Data at Rest with Vormetric Data Security Expert Deploying Encryption and Access Control to Protect Stored Data Across the Enterprise Enterprise Information

More information

Securely maintaining sensitive financial and

Securely maintaining sensitive financial and How the Guardium Platform Helped Dell IT Simplify Enterprise security By Phil Neray Addison Lawrence David McMaster Venugopal Nonavinakere Safeguarding data is critical for many organizations, but auditing

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

White paper September 2009. Realizing business value with mainframe security management

White paper September 2009. Realizing business value with mainframe security management White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment

More information

New Security Options in DB2 for z/os Release 9 and 10

New Security Options in DB2 for z/os Release 9 and 10 New Security Options in DB2 for z/os Release 9 and 10 IBM has added several security improvements for DB2 (IBM s mainframe strategic database software) in these releases. Both Data Security Officers and

More information

IBM Software Top tips for securing big data environments

IBM Software Top tips for securing big data environments IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,

More information

<Insert Picture Here> Oracle Database Vault

<Insert Picture Here> Oracle Database Vault Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information

More information

Data-Centric Security vs. Database-Level Security

Data-Centric Security vs. Database-Level Security TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides

More information

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

Making Data Security The Foundation Of Your Virtualization Infrastructure

Making Data Security The Foundation Of Your Virtualization Infrastructure Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges

More information

Security It s an ecosystem thing

Security It s an ecosystem thing Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment

More information

A Strategic Approach to Enterprise Key Management

A Strategic Approach to Enterprise Key Management Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption

More information

Alliance Key Manager Cloud HSM Frequently Asked Questions

Alliance Key Manager Cloud HSM Frequently Asked Questions Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

D50323GC20 Oracle Database 11g: Security Release 2

D50323GC20 Oracle Database 11g: Security Release 2 D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their

More information

Security of Cloud Computing for the Power Grid

Security of Cloud Computing for the Power Grid ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Secure Database Backups with SecureZIP

Secure Database Backups with SecureZIP Secure Database Backups with SecureZIP A pproved procedures for insuring database recovery in the event of a disaster call for backing up the database and storing a copy of the backup offsite. Given the

More information

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Database Auditing and Compliance in a Mainframe Environment Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc. Table of Contents Introduction................................................................................

More information

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS! The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader

More information

Chapter 8 A secure virtual web database environment

Chapter 8 A secure virtual web database environment Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services

More information

DATABASE AUDITING TOOLS AND STRATEGIES

DATABASE AUDITING TOOLS AND STRATEGIES DATABASE AUDITING TOOLS AND STRATEGIES Authored by: Ed Chopskie, Vice President SenSage, Inc. TABLE OF CONTENTS Introduction.. Page 3 Native Database Auditing.... Page 4 Vendor Native Auditing Capabilities...

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information