Making Database Security an IT Security Priority
|
|
|
- Loreen Stephens
- 9 years ago
- Views:
Transcription
1 Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases a Priority Database Security Considerations
2 Introduction Organizations are becoming more concerned about data security, especially as the intrinsic value of our data continues to increase. However, database security often gets overlooked. Managing organizational assets such as data, as well as overall information security concerns, are two of the key technology areas having a large affect on companies today. Although it is often difficult to put an exact price tag on the data we store, we do know data is an extremely valuable asset, and the compromise and/or exposure of such information can cause significant damage to business and company reputation. As a result, a security strategy needs to be developed to address information security risks, including data security. Throughout this paper we discuss security strategy and the key controls that should be considered in an organization s security strategy as they relate specifically to database security and protecting an organization s information assets. SANS Analyst Program 1 Making Database Security an IT Security Priority
3 Security Strategy Overview A security strategy is an overall plan to mitigate risk. While many organizations today have a security strategy, what is sometimes missed or not adequately addressed is database security. A security strategy must mitigate the overall possibility of harm or loss to a company s data. Furthermore, a security strategy must address the business data concerns from a legal, statutory and contractual perspective. Multiple regulatory requirements and standards, such as PCI, HITECH/HIPAA, GLBA, SOX, privacy laws and others have required organizations to address information security risks. According to the SANS Database Audit and Compliance Survey, 74 percent of the respondents felt their organizations utilized data that is or might be considered regulated. 1 Additionally, contracts are increasingly requiring organizations to consider security at all layers. Addressing database security in a proactive manner can save organizations a significant amount of money and reduce the overall risk exposure. When building a security strategy, the following key steps must be taken: Define organizational control objectives. Identify an approach to meet the objectives. Identify controls to meet the objectives. Identify metrics and/or benchmarks to manage the controls. Implement the controls. Test and maintain the controls going forward. Preventive, detective and corrective controls should be implemented to cover people, process and technology for all information security assets. 1 SANS Analyst Program 2 Making Database Security an IT Security Priority
4 Why a Database Security Strategy? If regulatory or contractual requirements are not enough reason to address database security as part of an overall security strategy, let s look at a few other key facts that encourage us to consider database security as a part of our security strategy. Databases are increasingly being targeted by attackers. In Verizon s 2009 Data Breach Investigations Report it was noted that 30 percent of breaches were against databases, as Figure 1 illustrates. The only other asset that had a larger percentage of breaches was POS systems, and many of them still contain or interact with a database. Figure 1: Percentage of Breaches per Asset Type SANS Analyst Program 3 Making Database Security an IT Security Priority
5 What is even more concerning is the percentage of records compromised when a database is breached. When a POS system is breached, only six percent of the records were compromised. However, when a database is breached, 75 percent of the records were compromised! Of course, the database is a much larger overall risk area to have a larger impact on an organization. No other asset had nearly as high a percentage of total records compromised, as Figure 2 illustrates. Figure 2: Percentage of Records Compromised per Asset Type 3 Data plays an extremely important role in a typical organization s environment. Security has historically addressed keeping the external attackers out of networks and operating systems. More recently, the focus has been on security of applications. Organizations spend large amounts of resources adding firewalls, IDS, IPS, policies, operating systems controls, access controls and other security controls to end points and on the network. By doing so, organizations believe they are protected. However, without controls directly around the data, they ve left open an opportunity for an internal attacker who is authorized to access and transfer data from the database. For an attacker, a compromise of a database can have an immediate and large financial payoff. For organizations, a database compromise can have a large, negative financial impact on their business. By way of example, TJX has set aside $197 million in reserves to deal with the theft of 94 million records. 4 And, as of May 2009, Heartland had spent $12.6 million on costs related to its January 2009 breach, according to an article in SCMagazine scmagazineus.com/126-million-spent-so-far-to-respond-to-heartland-breach/article/136491/ SANS Analyst Program 4 Making Database Security an IT Security Priority
6 Making Databases a Priority Databases, by their nature, are complex. Many security professionals simply do not have the background to understand the risk and security issues related to various brands and versions of databases. This leaves security in the hands of DBAs, who spend less than five percent of their time on database security, according to a Forrester Research report. The report stated that many enterprise DBAs are unaware of which databases, tables, and columns contain sensitive data, either because these are legacy applications and/or because no documentation of the data models and their properties exists. 6 Even with full knowledge of database assets, databases are more difficult to protect uniformly because there are unique security implementation procedures for the databases themselves, as well as with the applications interacting with them. Forrester estimates that more than 90 percent of enterprises support more than one type of database in their environment. Enterprises today have to support hundreds and thousands of production databases with various business applications running on them. Business applications interacting with the databases can pose significant risks as additional application layer vulnerabilities may be introduced. In order to effectively protect the organization s data, database security must become a management priority. Without management s support and strategic direction, database security will continue to be overlooked. While implementation of firewalls, IDS, IPS, policies, operating system controls, access controls, and other security controls is certainly important, and defense in depth should always be emphasized, these layers of security may be automatically bypassed if the attacker is an insider. Furthermore, the database may be left wide open and accessible from any internal system, or at least many more systems than necessary. There may be no real structure to the security implemented in the database, and simple vulnerabilities such as default accounts may give an attacker access. Companies should obviously continue to protect their networks, servers and other systems with the tools they re currently using. However, they can no longer rely exclusively on perimeter controls to protect data inside their organizations. There are many, like the Jericho Forum, proclaiming the death of network perimeters and calling for more data centric protections. Whether you agree or disagree that the perimeter is dead, controls do need to be moved closer to the data being protected. Then, if an attacker does bypass network security or other internal controls, the database layer security controls can still be effective. In other words: Keep the security controls close to the action! 6 Reference: Jonathan Penn, Forrester Market Overview: IT Security in 2009, Forrester Research SANS Analyst Program 5 Making Database Security an IT Security Priority
7 As indicated in Figure 3, adding controls as close to the data as possible places the final layer of security around the data stored in databases, protecting it from both external and internal attacks. Figure 3: Layers of Controls and Protection from Attack Vectors In summary, database security must be a part of the strategic plan: Databases recently saw the largest percentage of compromised records per incident and are one of the top compromised assets. The number of incidents continues to increase. Management support is critical to ensure successful implementation of security controls. Many security departments and professionals do not understand and/or look at database security. Controls should be applied as close to the data (in the database) as possible to protect from both external and internal attackers. SANS Analyst Program 6 Making Database Security an IT Security Priority
8 Database Security Considerations We know we need to address database security as part of our overall security strategy. So, the question becomes, what key areas should be addressed? The following areas are critical areas we discuss throughout the remainder of this paper: Access controls Encryption Auditing Separation of environments Secure configuration There are other controls that should also be considered, such as physical security, policies, user awareness training, and backups, among others, that organizations have already addressed for other critical systems. We will not directly address those here, except to refer to them as important security controls. The controls we look at in this document are controls specific to the database environment that are less likely to be addressed at the database layer of the enterprise. Access Controls Access controls not only protect against external and internal attackers, they can also protect from the mistakes that users introduce errors that can potentially have as big an impact on operations as an external or internal attacker. For example, a user drops or deletes a business critical object, such as a required database table that they assume is not in use. Access controls can also minimize the impact of other risks that may affect the database, such as application risks that have a direct impact on the security of the database on the backend. There are many resources that illuminate and provide statistics on the number of application risks that exist. 7 For example, Web application SQL injection attacks 8 pose one of the most significant risks to databases, according to the SANS Institute Top 20 9 and the Verizon report. In fact, when SQL injection was used, the attacker was able to compromise an average of 79 percent of the records, according to Verizon s report. SQL injection can be used to query data the attacker should not have access to, run built-in packages in the database, and potentially even get a command prompt on the underlying operating system. 7 An example of one such site is SANS Analyst Program 7 Making Database Security an IT Security Priority
9 Access controls should be deployed based on the principle of least privilege. Access controls should be applied to two primary categories of users: administrators and standard end users. For administrators, each DBA should be limited to only the functionality they need to do their job. Many times default functionality, including default roles, provide many more privileges than are necessary because they are designed for ease of use. In such cases, default roles such as DBA should not be used, and instead specific roles for administrative activities should be designed to grant only necessary privileges. This may require multiple roles to be set up for different levels or types of administrators, as Figure 4 illustrates. Figure 4: Example of Access Controls for Administrators Even organizations that do not have multiple administrators should limit administrative access to only what is necessary for that administrator at a given point in time. Again, this can minimize the impact of errors and security incidents. With an Oracle database, for example, you may also use one of the options called Database Vault, 10 which can control what administrators can do and what data they can see within a database. For access control, considerations can also be given to multifactor authentication and authorization, which can also be implemented in many different ways, including with Database Vault and other built-in functions SANS Analyst Program 8 Making Database Security an IT Security Priority
10 Applications need to give further consideration to security in order to protect the backend database. If a single account is used to connect to the backend database, the database may lose the capability to effectively track the individual user s activity. Applications should use solutions such as Virtual Private Database (VPD) 11, Label Security 12 and Secure Application Roles, 13 which allow dynamic control over what information is available to end users, based on their environment or context. Login triggers that monitor who a user is, and information, such as where the user is coming from, can be used to limit what a user can do when connecting to a database. These are powerful features that, when implemented correctly, can significantly decrease the overall risk the database faces from an access control perspective. For regulatory purposes, access controls are often a foundational component that organizations must address because the access controls directly impact what information users can access. Centralized management of these controls can also reduce the risk of improperly applying access controls to any user administrative or nonadministrative. While organizations have been working to centrally manage the provisioning and deprovisioning of users for years, they often overlook database user provisioning in their plans. Centrally enforcing password management policies and authorization can be beneficial to the overall database environment. Enterprise User Security 14 is a way to meet the need to manage users externally in an enterprise wide identity management system. Encryption Encryption use is growing in response to regulatory compliance mandates and auditor requirements for such controls. Encryption is a strong security control when implemented correctly. However, some organizations view encryption as a magical solution that will solve all their data security problems. While no database security strategy would be complete without data encryption, the reality is that we need to understand the entire environment, and then protect data in two states: data in transit and data at rest. Databases provide different solutions for encrypting data in transit and data at rest. Often, two solutions are needed to address each of the risks posed SANS Analyst Program 9 Making Database Security an IT Security Priority
11 Data in transit refers to the data that is traveling across a network. We want to ensure that data is being encrypted as it traverses the network, when possible, or at least make sure the network is properly segmented so an insider cannot easily sniff the network traffic. As a recent illustration of why it is important to encrypt sensitive traffic internally, TJX had a very large breach in 2006, where payment card and customer data was captured using a sniffer to monitor the internal network traffic. End to end encryption is a strong protection against data leakage from internal attacks. Encryption solutions for traffic include SSL, SSH, IPsec, and others, often provided natively by databases. Data at rest refers to data that is being stored within the database. Data can be encrypted at different tiers as part of an application, but that practice can pose potential challenges for key management and system updates. By encrypting the data in the database itself, you centralize the encryption controls for the data at its source. Encryption can be applied per column or for an entire tablespace. It is also important to note that encryption must also be applicable to data being stored for backup purposes. This is also data at rest that must be properly protected. Auditing Ultimately, we can and must implement the access controls talked about previously; however, in order for users to get their jobs done, we must grant some access. Therein lies the risk. You have to allow the DBA and users to do their job, so you have to give some privileges. But how do you know if privileges are being abused? And how does the DBA or user know that they are protected and are not going to be accused of abusing privileges they have been granted when they have not? You can mitigate these risks by implementing and properly managing the audit trails within the database. Auditing allows you to track user activity, including administrator activity. Many options exist for auditing, including standard database auditing features. At a minimum, activities such as the following should be audited for regulatory requirements: Administrative activity Logon and logoff activity Failures Use of system privileges Use of all privileges Alterations to the database structure Critical object access SANS Analyst Program 10 Making Database Security an IT Security Priority
12 Customized auditing for the environment may also be necessary. For example, when users read or change specific records, you may want to record this activity. Solutions such as Fine Grained Auditing (FGA) can be used to monitor such activity and customize auditing based on predefined conditions. 15 Storing audit records on a secondary system and centralizing the audit records is also critical. By storing records on a secondary system there is reduced likelihood that unauthorized activity recorded in the audit trail can be changed. Furthermore, by centralizing the audit records on a single system, it is easier to review and monitor activity across databases instead of looking at each database individually. In an Oracle environment, this functionality can be provided through Audit Vault. 16 Separation of Environments Separation of production, test, QA and development or similar environments has been an information security best practice for many years and has become embedded in many regulatory requirements and standards and audit programs. Environments and the data stored in them need to be separated because developers and development environments pose a significant risk to the organization because of the access they have. Ideally, developers should only have access to the development environment, unless there is a business need, such as troubleshooting a problem that cannot be duplicated in the development environment. If access does need to be given, developers should be given read-only roles with minimal privileges and their actions must be audited. Roles should be created proactively so, when a problem does arise, unnecessary access is not granted as a quick solution SANS Analyst Program 11 Making Database Security an IT Security Priority
13 Production data should not be propagated to other environments, such as development or test. However, the data can be manipulated to enable transfer of the data to other environments without leaving it open to compromise. For example, Oracle s Data Masking 17 can automate this process of de-identifying data. Data Masking can take sensitive information such as social security or credit card numbers and replace them with realistic but simulated values while still maintaining referential integrity so applications continue to work. These fully functional masked databases are safe to move to nonproduction environments. If attackers do get access to these other environments, which are typically less secure then production, the data is useless to them. This separation is illustrated in Figure 5. Figure 5: Proper Separation of Production, Test and Development Environments, Including Separation of Data Secure Configuration Ultimately, we are responsible for securing systems within the environment, and that includes the database. Unfortunately, as mentioned previously, many security professionals simply do not understand or have not looked at database security. The challenge with a database is that the complexity involved can often be overwhelming! Complexity is the enemy of security and can lead to mistakes. However, with the right tools, the complexity can be managed successfully SANS Analyst Program 12 Making Database Security an IT Security Priority
14 To properly address database security, tools are required to automate the entire secure configuration life cycle. This includes database discovery, security scanning, configuration lock down, automated remediation, and so on. Security consideration needs to be given to the database itself, as well as the surrounding environment, including the underlying operating system and applications. Here are key areas that should be considered when securing a database: Default accounts Users and roles Exposed passwords Patching Privileges and permissions Parameter settings Password management Profiles Auditing Listener security Database vendors have begun taking the hardening process more seriously. Solutions such as Oracle Configuration Management Pack 18 can help monitor and identify configuration vulnerabilities. Once a database is properly secured, configuration vulnerabilities need to be continuously monitored for potential changes, because well-intentioned users may modify the configuration of a system, thereby leaving it in a vulnerable state. Not only is it important to monitor for configuration drift for security purposes, but there are also many regulatory requirements today that require a system to be configured in a particular state. By continuously monitoring for changes, management can be notified automatically if a database no longer meets an organization s security requirements and/or regulatory requirements SANS Analyst Program 13 Making Database Security an IT Security Priority
15 Summary Sometimes it is incorrectly assumed that doing nothing will cost an organization nothing. In reality, doing nothing related to the database security strategies discussed in this paper can cost an organization millions. For example, Heartland has publicly admitted to paying nearly $13 million on breach-related costs, and that number will most likely increase. Many regulatory requirements, standards and audits that are conducted today require the controls discussed in this paper. Organizations need to consider database security as a part of their overall security strategy. Database security should be sold to the organization as a whole. After all, the most critical asset an organization has is its data. Security is everyone s responsibility. This means the DBA must play a role, as well as the security department and end users with access. Executives should clearly define the roles of DBAs, security departments, auditors and others within an organization to ensure that database security risks have been addressed and that proper separation of duties is maintained when new controls are implemented. By providing an overall strategy for the environment, executives can encourage different departments to work together to meet the organization s overall security requirements. The good news, today, is that organizations are becoming more aware of their database security issues. Now they need to wrap robust database security strategies into their overall security and compliance strategies. Fortunately, database vendors have added some excellent security enhancements over the years that can greatly reduce the overall risk the database faces within a given environment. Such advancements will help organizations put security close to their critical data and better meet regulatory requirements SANS Analyst Program 14 Making Database Security an IT Security Priority
16 About the Author Tanya Baccam is a SANS senior instructor as well as a SANS courseware author. She is the current author for the SANS Security 509: Securing Oracle Databases course. She also provides many security consulting services for clients, such as system audits, vulnerability and risk assessments, database audits, and Web application audits. Today much of her time is spent on the security of databases and applications within organizations. Tanya has also played an integral role in developing multiple business applications and currently holds the CPA, GCFW, GCIH, CISSP, CISM, CISA, CCNA, and OCP DBA certifications. SANS Analyst Program 15 Making Database Security an IT Security Priority
17 SANS would like to thank this paper s sponsor: SANS Analyst Program 16 Making Database Security an IT Security Priority
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Complete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Oracle Database 11g: Security
Oracle University Entre em contato: 0800 891 6502 Oracle Database 11g: Security Duração: 5 Dias Objetivos do Curso In Oracle Database 11g: Security course students learn how they can use Oracle database
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
5 Simple Steps to Secure Database Development
E-Guide 5 Simple Steps to Secure Database Development Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles
Oracle Health Sciences Network Security Guide Release 2.0.0.0 E50290-02 September 2015 1 Introduction The main challenge sponsors face in clinical trials is the elapsed time from the start of the protocol
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Comprehensive Approach to Database Security
Comprehensive Approach to Database Security [email protected] NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
White Paper. Imperva Data Security and Compliance Lifecycle
White Paper Today s highly regulated business environment is forcing corporations to comply with a multitude of different regulatory mandates, including data governance, data protection and industry regulations.
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
FairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
whitepaper 4 Best Practices for Building PCI DSS Compliant Networks
4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere
Protecting Databases from Unauthorized Activities Using Imperva SecureSphere White Paper As the primary repository for the enterprise s most valuable information, the database is perhaps the most sensitive
Fixing Common Problems in Data Storage - A Review
Security Design For Your Database Applications Least privilege, data and ownership 1 Legal Notice Security Design For Your Database Applications Published by PeteFinnigan.com Limited 9 Beech Grove Acomb
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
