DBA SECURITY SUPERHERO
|
|
|
- Kerry Holt
- 10 years ago
- Views:
Transcription
1 DBA SECURITY SUPERHERO 2014 IOUG ENTERPRISE DATA SECURITY SURVEY By Joseph McKendrick, Research Analyst Produced by Unisphere Research, a Division of Information Today, Inc. October 2014 Sponsored by Produced by
2 2 TABLE OF CONTENTS Executive Summary 3 Risk Factors and Educating the Business 4 Preventive Controls 13 Detective Controls 18 Administrative Controls 23 Call to Action 26 Demographics 27
3 3 EXECUTIVE SUMMARY With great power comes great responsibility Francois-Marie Arouet (Voltaire) When it comes to data security, today s enterprises are under assault as they never have been before. This year s Russian hacker breach by CyberVor was the most visible example of sensitive data falling into the wrong hands, but this incident was only one of many the news never stops. The world needs a hero to step forward. In fact, it needs many heroes with the power and knowledge to step forth and do something about this problem. Database administrators are in the right place, at the right time. Data security has evolved into a top business challenge. The challenge continues to grow and the villains are taking advantage of lax preventive and detective measures. In many ways, it has become an enterprise-wide challenge in search of leadership. Senior executives are only too painfully aware of what s at stake for their businesses, but often don t know how to approach the challenge. This is an opportunity for database administrators and security professionals to work together, take a leadership role, and move the enterprise to take action. Who else can we look to as stewards of sensitive intellectual property, personally identifiable and protected health information? Who else has the privileges bestowed upon them to manage and administer this sensitive data? Our heroes, the database administrators have the knowledge and education to secure sensitive data on behalf of organizations and citizens of the known universe. Now is the time for database administrators and security professionals to lead their companies to ensure data privacy, protect against insider threats, and address regulatory compliance. As we do each year, the Independent Oracle Users Group (IOUG) surveys a wide range of database security and IT professionals responsible for security, and examines the current state of enterprise data security. By using this data, our desire is for readers to educate their executives and gain consensus with the security team to drive a data security strategy with actionable objectives. Underwritten by Oracle Corporation and conducted by Unisphere Research, a division of Information Today, Inc., the report summarizes the findings from a survey of 353 IOUG data managers and professionals. Key highlights include the following: n Enterprises recognize that data risks come from within, and continue to increase funding. However, close to half still release production data to outside parties, and more than one-fifth report sensitive data is still vulnerable to breaches. n Two-fifths of respondents admit they are not fully aware of where all the sensitive data in their organizations is kept. Those taking proactive measures to lock down data and render it useless to outsiders are still in the minority. Relatively few have safeguards against accidental or intentional staff abuse. n Organizations are still not doing enough to monitor their data assets or keep tabs on super-users. Only about one-third can prove abuse of data assets. In a world where stolen data can be distributed globally within seconds, two-thirds of managers estimate that it would take a matter of days to remediate a breach, or simply don t know what length of time would be involved. n Data security audits still remain few and far between. Only one-sixth review their data assets on at least a monthly basis. As the data shows, data security is not something respondents take lightly. Yet, it s an ongoing, evolving challenge to protect the growing amounts of information on which enterprises rely. While many organizations in the survey have been spared of major incidents so far, it pays to stay vigilant. As one respondent put it: You have to assume it s going to happen someday. Luck favors the prepared. Within today s enterprises, no other type of professional is better equipped or more knowledgeable to deal with data security than database professionals.these are the individuals who understand where the risks are, and how these risks can ultimately affect their organizations. In an era in which information is the most precious resource powering business, database professionals can take a leadership role in helping to prepare and protect these assets. Preparation and education is a role experienced data managers and professionals are ready to take on in their enterprises. Survey respondents hold a variety of job roles and represent a wide range of organization types, sizes, and industry verticals. The largest segment of respondents, 44%, hold the title of database administrator, followed by director or manager. One-third work for very large organizations with more than 10,000 employees. By industry sector, the majority of respondents come from IT service providers, government, education, financial services, and manufacturing. (See Figures at the end of this report for more detailed demographic information on job titles, company sizes, and industry groups.)
4 4 RISK FACTORS AND EDUCATING THE BUSINESS Enterprises recognize that data risks come from within, and continue to increase funding. However, close to half still release production data to outside parties, and more than one-fifth report sensitive data is still vulnerable to breaches. IT and data managers have opportunities to educate their businesses on where the primary threats are, and how to mitigate. The need is urgent; the 2014 survey shows that organizations are more willing to face the fact that they may experience a data breach in the next 12 months. More respondents believe the likelihood of a data breach is inevitable since the survey was first conducted in 2008 (more applies to the number of respondents, not relative inevitability), from 20% who believed a data breach was somewhat likely or inevitable to 34% now. (See Figure 1.) IT managers and professionals recognize that every organization needs to prepare for the possibility of a breach. As one respondent put it: With the advent of new ways and implementation and collection of more data, it is inevitable that the data will be breached, not if, but when. There are multiple players in multiple databases that leaves an opening for a dishonest employee, unhappy vendor or an outside hacker getting in, says another respondent. The most sensitive data is protected by multiple layers of protection, but still there is a possibility that there may be a breach at some time in the future. Still, a number of survey respondents indicated that they felt their data was safe because it was locked behind corporate firewalls, or wasn t connected in any way to outside networks. As will be discussed throughout this report, this does not provide protection against insider abuse or breaches. As a respondent put it: It only takes one bad egg among the workforce or contractors to put data at risk. It appears most organizations have been lucky so far. Overall, as has been the case in years past, only six percent say they were aware of a data breach within their enterprises, with another 23% admitting they simply aren t aware if any may have taken place. (See Figure 2.) Respondents from mid-size companies were most likely to be aware of data breaches. (See Figure 3.) Data security is a difficult issue to report, even in a confidential survey, and even more often is difficult to be sure of, as observed by one respondent. We cannot be certain there has been no silent breach. There is no evidence we have detected of breach or corruption. But picturing yourself as highly unlikely to be breached we feel is like wearing a kick-me sign on your backside. There are numerous costs associated with a data security breach. Such costs include direct, indirect and opportunity costs, including lost business, customer churn, customer acquisition activities, and lost brand reputation. According to the latest figures from the Ponemon Institute, the estimated average cost of a data breach is now $3.5 million per incident, a 15% increase over the 2013 figures. 1 Many enterprises are also subject to potential fines and penalties levied under a number of government regulatory mandates. These mandates also result in additional reporting requirements. Data management mandates and regulations affect most companies in this survey, including the Sarbanes-Oxley Act, local and state regulations, and HIPAA HITECH. (See Figure 4.) While there is a great deal of concern about the threat of outside hackers, insider threats remain the most foremost problem. The Target data breach of 2013, for example, occurred because of an outside hacking, but it was a trusted contractor that unintentionally opened up the gates. Many data breaches even those coming from outside are the result of carelessness, unclear or non-existent policies, or inside vulnerabilities, either in data centers or among third-party partners. And in the eyes of IT managers and professionals, these vulnerabilities are only increasing as time goes on. As this survey shows, human error is still seen as the greatest risk to enterprise data, cited by 81% up from 77% last year (rated as a high to medium threat by IT managers). This is followed by fear of inside hacks 65%, up from 63% last year, 57% in Risks also are rising across other areas of vulnerability, survey respondents point out. For example, 54% are now concerned about abuse of access privileges by their own IT staff up from 48% a year ago. More than half, 53%, say that malicious code and viruses entering their systems are a threat up from 38% just two years ago. (See Figure 5.) When asked about the parts of their systems most vulnerable to security issues, respondents in the survey point to their databases 58% agree that this is where the greatest precautions need to take place. The network is the next most-cited area of potential damage, followed by the server and storage infrastructure. However, these vulnerabilities are not funded according to greatest risk. Most companies pour resources into their networks, followed by servers and databases. Interestingly, a majority say a large amount of resources also go into locking down desktops, though these are seen as less likely to contribute to damage from potential data breaches (See Figure 6.) Close to half the organizations in the survey are demonstrating a growing commitment in terms of resources and dollars to data security efforts. This is unchanged from last year s rate, and Cost of Data Breach Study, The Ponemon Institute, May t t
5 5 continues the highest levels reported since the first survey in this series was conducted in (See Figure 7.) One major area of risk is enterprise business intelligence tools, and increased demands for user access to data. A sizable segment of those surveyed see this as a security vulnerability. Twenty-one percent say data in at least some applications could be exposed. This is slightly less than 26% who feared such a vulnerability a year ago. Interestingly, however, there appears to be less awareness of the problem than a year ago 36% say they don t know the level of vulnerability, compared to 22% a year ago. This may be a reflection of the proliferation of business intelligence tools, particularly as these tools increasingly leverage cloud and mobile platforms. (See Figure 8.) Often, roles can be confusing. As one respondent put it: Correct database roles, with user access restricted by role, should ideally result in no unintentionally disclosed data. But occasionally a DBA may misunderstand what is the correct role, or use a generic encompassing role. This is also a challenge with dev/support work tasked out off-shore or to outside consulting groups, where there aren t job titles or identifiable mission statements that DBA can tie roles. Still, restricting or more closely guarding such access often requires organizational involvement. As one respondent explained: Some spreadsheets use sign-ons of employees no longer present. When we close those accounts, the users howl, and management makes us re-open them. There s also an ad hoc account that many users across the division have access to. At the root of many enterprise risks is when copies of live production data which often includes sensitive or personally identifiable information leave the data center, often going to other parts of the enterprise, such as development shops or backup sites. Often as well, copies of such data may be sent to outside third parties, such as contract development shops. Masking sensitive data in non-production environments, for development, QA and testing, is as important as protecting data in production environments. Close to half, 45%, of all respondents use copies of production data in non-production environments unchanged from last year. About one-third, 32%, say they use outdated copies of production data down from 37%. (See Figure 9.) This is a step in the right direction, however outdated copies can often include data that never becomes outdated, such as names and social security numbers. Complicating the proliferation of production data is the fact that high numbers of data copies are spread across the enterprise. More than two-fifths of survey respondents, 41%, indicate that they have three or more copies of production data across and outside their enterprises including offsite backups and third-party storage sites. (See Figure 10.) Multiple data copies are most pervasive across midsize enterprises. (See Figure 11.)
6 6 Figure 1: Predicted Likelihood of a Data Breach Over Next 12 Months % % Figure 2: Known Data Breaches over Past Year Yes 6% No 71% Don t know/unsure 23% Figure 3: Data Breaches By Company Size (Respondents reporting known data breaches within each size category) <500 employees 6% 501 to 5,000 employees 10% >5,000 employees 4%
7 7 Figure 4: Compliance Mandates Sarbanes-Oxley Act (SOX) 55% HIPAA/HITECH 42% Local state/government data 42% protection laws Payment Card Industry (PCI) 33% SAS 70 19% FISMA 9% ITAR 6% NERC 4%
8 8 Figure 5: Where the Data Risks Are at This Time Human error 77% 81% Internal hackers or unauthorized users 57% 63% 66% Abuse of privileges by IT staff 48% 48% 54% Malicious code/viruses 38% 49% 53% Unprotected web applications 44% 52% Outside hackers 27% 44% 49% Advanced persistent threat 40% 46% Lack of management commitment/lax procedures 43% 41% 42% Lack of auditability of access and changes 47% 39% 39% Loss of hardware or media 39% 38% 38% Abuse by outside partners/suppliers 25% 32% 35% Fines/lawsuits 25% 22% 23%
9 9 Figure 6: Vulnerabilities versus Priorities Greatest vulnerability* Most resources allocated** Database 58% 56% Network 51% 65% Servers (file, web, ) 48% 57% Storage 47% 43% Application 41% 50% Operating system 40% 51% Virtual machine 37% 48% Desktop 33% 53% Middleware 32% 38% Mobile devices 16% 21% * Respondents indicating high levels or maximum potential damage with a breach here. ** High/most resources allocated for securing these areas.
10 10 Figure 7: Year-to-Year Percentages Reporting Increased IT Security Spending % % % % % % % Figure 8: Sensitive Data Unintentionally Disclosed to Enterprise Application/ Business Intelligence Users Yes, in some applications 16% No 42% Yes, in most applications 5% (Total does not equal 100% due to rounding.) Don t know/unsure 36%
11 11 Figure 9: Production Data Used in Non-Production Environments Copies of enterprise production data 45% Masked or de-identified enterprise 37% production data Old or outdated production data 32% Sample simulated data (provided by 30% application vendor or developer) Don t know/unsure 10% Figure 10: Number of Copies of Production Data One copy outside our production database 21% Two copies 21% Three copies 18% 41% Four copies 6% Five or more copies 17% Don t know/unsure 18%
12 12 Figure 11: Three or More Copies of Data By Company Size (Respondents reporting three or more copies within each size category) <500 employees 33% 501 to 5,000 employees 47% >5,000 employees 40%
13 13 PREVENTIVE CONTROLS Two-fifths of managers and professionals admit they are not fully aware of where all the sensitive data in their organizations is kept. Those taking proactive measures to lock down data and render it useless to outsiders are still in the minority. Relatively few have safeguards against accidental or intentional staff abuse, and less than one-third have an automated approach to assist their security oversight. To take the lead in enterprise data security, industry consensus is to follow a defense-in-depth strategy for securing data. The first step is implementing preventive measures, such as encryption, masking, redacting and access controls. The survey finds that these measures are still lacking as they have been since the first survey in this series was conducted in To achieve a robust architecture employing preventive tools, database administrators and security professionals need to understand where sensitive data exists across their organizations. This is often easier said than done, as many organizations have multiple departments with multiple systems. In the current survey, only 61% of respondents claims they know all databases that have sensitive and regulated data. This is down from 70% a year ago, and reflects the increasing complexity of today s enterprise systems, especially with the rise of cloud and digital platforms that may be accessed and managed outside IT s domain. (See Figure 12.) This problem is more acute at larger enterprises, whereas managers and professionals in smaller firms are more likely to be aware of risky data. (See Figure 13.) The complexity of today s data environments, along with management inertia, may be hampering respondents abilities to implement full-fledged preventive data protection efforts. About 65% of respondents encrypt data at rest on at least some databases to ensure personally identifiable information is protected down from 70% in the last survey. An even much lower percentage, 18%, ensure that they have blanket coverage for all key databases in their organization down significantly from 29% from 2008, the first year this question was asked. (See Figure 14.) Overall awareness of security measures is down somewhat: The percentage of respondents indicating they don t know if measures are taken rose back to 11% up from 4% last year. The percentage not aware of their security posture declined from 18% in 2008 to 11% in Encryption of data at rest is just as likely to be in place at small organizations as it is within large enterprises. (See Figure 15.) When asked whether organizations are encrypting online or offline backups and exports, a quarter of respondents indicated they do in fact encrypt all data. This is roughly the same as a year ago, but up from 20% in Overall, a majority of enterprises in the survey, 56%, encrypt at least a portion of database backups. (See Figure 16.) As indicated previously, 45% of all respondents use copies of production data in non-production environments. Along with encryption, masking sensitive data in non-production database environments, for development, QA and testing, is as important as protecting data in production environments. Various regulations, such as Payment Card Industry Data Security Standard requirement 3.3, indicate that organizations must redact sensitive data whenever it is displayed. However, 54% either do not, or were not sure whether they were removing sensitive application-layer data. In fact, 11% were not even aware that such a regulation existed. For organizations that say they address this requirement, 16% are using home grown solutions, with another 31% employing third-party or packaged applications. (See Figure 17.) As discussed in the previous section, human error and internal hacking are two of the most feared security risks, both of which can be limited and even prevented using privilege user access controls. However, close to one-quarter, 71%, have no safeguards or are unsure if they have safeguards to prevent a database administrator or developer from accidentally dropping a table or unintentionally causing harm to critical application databases. (See Figure 18.) When asked whether organizations could prevent privileged users, such as DBAs, from reading or tampering with sensitive data in business application data, 67% could not, or were unsure. This presents a large issue across the enterprise and should be addressed with privileged user controls. (See Figure 19.) Data disruptions can occur at many points across today s highly diverse organizations. As one respondent put it: An unfortunate weakness in our business model are applications which allow and enable elevated access privileges disseminated to technical experts in various departments. A holistic strategy is often required at multiple levels. We are currently implementing several security constraints so that data is not directly accessible by any end users and only specific and limited users have access to the databases, says one respondent.
14 14 Figure 12: Aware of all Databases With Sensitive or Regulated Information? Yes 61% No 39% Figure 13: Aware of Sensitive Data in Databases By Company Size <500 employees 75% 501 to 5,000 employees 68% >5,000 employees 49% Figure 14: Data at Rest Encryption In all In some No Don t databases databases know % 28% 25% 18% % 50% 26% 4% % 47% 24% 11%
15 15 Figure 15: Data at Rest Encryption By Company Size In all databases nnnnnn In some databases nnnnnn <500 employees 19% 43% 501 to 5,000 employees 17% 42% >5,000 employees 19% 52% Figure 16: Database Backup and Export Encryption In all In some No Don t databases databases know % 32% 55% 25% % 38% 29% 6% % 31% 32% 13%
16 16 Figure 17: How Sensitive Data is Masked to Meet Mandates and Regulations Using packaged applications 20% Using home-grown solutions 16% Not aware of requirements 11% Using third-party security vendor 10% Evaluating solutions now 6% Other 1% Not applicable 14% Don t know/unsure 22% Figure 18: Safeguards Against Accidental Harm to Databases and Applications? Yes 28% No 51% (Total does not equal 100% due to rounding.) Don t know/unsure 20%
17 17 Figure 19: Able to Prevent Privileged Users from Reading or Tampering with Sensitive Business Information? Yes 33% No 35% Don t know/unsure 32%
18 18 DETECTIVE CONTROLS Organizations are still not doing enough to monitor their data assets or keep tabs on super-users. Only about one-third can prove abuse of data assets. In a world where data can be distributed globally within seconds, two-thirds of managers estimate that it would take a matter of days to remediate a breach, or simply don t know what length of time would be involved. Preventing cybercriminals from accessing sensitive data should be the foundation of a defense-in-depth strategy, and detective controls provide the forensics that capture characteristics of the attack as they occur. However, there has been little progress in enterprises being able to prove that privileged database users were not abusing their super-user privileges 35% this year, down from 39% a year ago. (See Figure 20.) Likewise, only 35% say they are able to detect unauthorized changes across most databases. (See Figure 21.) The difficulties in fully securing data against administrator or privileged user abuse was illustrated by one respondent, who noted that the simplest way is to implement tough security standards so all the DBA accounts get locked out. Of course this is impractical and there must be an appropriate and practical balance between data security and the business. In today s networked society, data breaches can occur at lightning speed. Unfortunately, the average amount of time to detect and correct security events is increasing. A total of 31% say it would take less than one business day to rectify a breach, down from 37% a year ago and 45% in Two-thirds say it may take days, or simply don t know how long remediation will last. (See Figures 22 and 23.) There has been relatively little progress in the percentage of respondents taking measures to guard against direct database network attacks such as SQL injection attacks, considered to be the most common database threat by security experts. In 2010, the first year this question was asked, 35% of respondents had taken steps to prevent these kinds of attacks. This year, 38% report taking such actions. Along with privilege escalation, monitoring database network attacks such as SQL injection attacks is a continuing threat. (See Figure 24.) Such monitoring requires a broad view across multiple systems, database and applications, a task that is complicated by the complexity of today s IT environments. As one respondent put it: We educate our developers and QA testers on how to check for SQL injection attacks. Even so, it would be too much to claim we have it covered for all applications across all web platforms. This does not suggest that respondents have thrown their hands up at the challenge, however. There are many proactive measures underway to keep tabs on security incidents across enterprises. Respondents are taking a number of other measures to address security holes in their data infrastructure, including the monitoring of a range of functions. About half of enterprises in the survey, 48%, employ tools to help monitor and identify possible anomalies in databases that may suggest suspicious activity. (See Figure 25.) However, only 32% do so on a regular, automated basis, a level that has changed little since the first survey in this series was commissioned six years ago. (See Figure 26.) The various monitored database activities are highlighted in Figure 27. Unfortunately, less than half of organizations watch for sensitive activities that include database login and logouts, as well as sensitive database table reads and writes. As well, 24% manually monitor their environment, which can be time consuming and error prone, especially within smaller organizations that have limited resources.
19 19 Figure 20: Can Prove Privileged Users Were Not Tampering Yes 32% 26% 39% 35% No 39% 48% 43% 43% Don t know/unsure 28% 25% 19% 22% Figure 21: Detect Unauthorized Database Changes? Yes, on most databases 35% No 18% On some databases 35% Don t know/unsure 12% Figure 22: Length of Time to Detect and Correct Unauthorized Database Access or Change 1 to 5 days 26% <1 hour 14% >5 days 8% 1 to 24 hours 17% Don t know/unsure 35%
20 20 Figure 23: Percentage Respondents Reporting It Would Take Less Than a Day to Detect and Correct Unauthorized Changes nnnnnnn 2013 nnnnnnn 2014 nnnnnnn % 37% 31% 0 Figure 24: Taken Steps to Prevent SQL Injection Attacks? Yes 38% Don t know/unsure 44% No 18%
21 21 Figure 25: How Data Security Monitoring is Conducted (For security Issues such as unauthorized access to data or configuration changes) Manually monitor on ad-hoc basis 13% Manually monitor on regular basis 14% Run tools on an ad-hoc basis 18% Run tools on a regular basis 30% No monitoring 17% Don t know/unsure 8% Figure 26: Use of Tools for Data Security Monitoring on a Regular Basis % % %
22 22 Figure 27: Database Activities Monitored All privileged user activities 57% Privilege grants 56% New account creation 54% Failed logins 54% Database definition changes 52% (new tables, dropped indexes) Login/logout 49% Writes to sensitive tables/columns 33% Read of sensitive tables/columns 29% Don t know/unsure 16% Other 2%
23 23 ADMINISTRATIVE CONTROLS Data security audits still remain few and far between. Only one-sixth review their data assets at least on a monthly basis. The ability to continually audit and assess evolving data security threats is another area where database managers and security professionals can provide high value to their organizations. However, the survey indicates that administrative measures to pull and review database activity remains only an occasional activity. After a bump in last year s survey, the percentage of enterprises conducting frequent audits (once a month or more) remains at low, stagnant levels 16%, the same as four years ago, the first time this question was asked. (See Figures 28 and 29.) There has not been appreciable movement in terms of audits. The percentage saying they never conduct security audits or don t know stands at 28%, in line with a year ago (27%), but down from 35% in While many respondents enterprises conduct auditing, it is often inconsistent. As one respondent put it: Extensive Auditing is enabled for the activities performed by all privileged users. These logs will be reviewed time to time. Additional gauges of administrative controls over data security include the length of time it takes to prepare for a security assessment or audit, compliance with mandates or regulations. This is key to the agility of the data security process. Database security audits can follow an intensive process depending on whether the process is manual or automated. Overall, 26% of respondents say it takes less than one day to prepare for an audit, down from 37% in last year s survey. Enterprises have been slipping backwards on this front, suggesting the increasing complexity and degree of overworked IT staffs that decrease the agility of this process. (See Figure 30.) One out of eight respondents indicate that recent compliance audits have flagged database security issues at their sites. (See Figure 31.) While data security is an ongoing and pressing concern, only 26% apply Oracle Critical Patches as they are released. (See Figure 32.) Figure 28: Frequency of Data Security Audits A few times a month 7% At least once a month 9% Quarterly 26% Annually 28% Never 6% Don t know/unsure 22% Other 2%
24 24 Figure 29: Percentage of Respondents Conducting Frequent Audits (Multiple times a month to at least once a month) % % % Figure 30: Length of Time to Prepare Database Security Assessment/Audit <1 hour 8% 1 to 24 hours 18% 1 to 5 days 24% >5 day 15% Don t know/unsure 35% Figure 31: Have Regulatory Compliance Audits Over the Past Months Flagged Any Database Security Issues? Yes 13% No 56% Don t know/unsure 31%
25 25 Figure 32: How Quickly Are Quarterly Oracle Critical Patch Updates Applied to All Databases? Typically before the next CPU 26% is released (within 1 to 3 months) One cycle late (3 to 6 months) 23% Two cycles late (6 to 9 months) 12% Three cycles late (9 to 12 months) 7% Four or more cycles late (>year) 6% Within 1 year 11% We have never applied a Critical 8% Patch Update Other 7%
26 26 CALL TO ACTION Data security is not just a technical challenge; it is an enterprise business challenge. Nearly 70% of the IOUG respondents indicate that the database group is responsible for data security within their organization. However, data security is arguably everyone s responsibility. As stewards of sensitive customer and organizational data, it is the database group s responsibility to step forth and educate the business on the mandate to secure data. The superhero DBA must balance service level agreements for performance and availability, with the often-neglected requirements for data security. Senior executives are only too painfully aware of what s at stake for their businesses, but often don t know how to approach the challenge. This is an opportunity for database administrators and security professionals to work together, take a leadership role, and move the enterprise to take action. The following steps need to be taken: Understand business leaders concerns. Communicate with business leaders in order to understand their data challenges and security concerns. Share with them the likelihood of a security breach and learn what they deem as the most sensitive data. Data security is an organizational issue that requires open communications and business involvement. Educate the business. As the steward of data, a superhero DBA must take a proactive stance, and educate the business about the risks, and how to address those risks. Use data metrics to make change. It all begins with providing metrics to help leaders prioritize data security versus their other responsibilities. By using the IOUG data security survey results to educate the business, database and security professionals offer substantial evidence of data security s greatest risks and industry trends. Emphasize prevention. More preventative measures such as data encryption and redaction need to be in place in order to stop malicious hackers in their tracks. Audit and monitor frequently. More auditing and monitoring needs to take place, so malicious acts do not continue unabated for lengthy periods of time. Only 30% of enterprises employ tools and processes to automate scanning for anomalies. New technology on the market relieves many of the manual burdens associated with database monitoring. Trust, but verify. At some point we need to trust our IT staff; however, we also need to verify they, and the use of their credentials, are trustworthy. Stolen credentials from superusers are a common attack vector. Therefore, it is important to follow the practice of separation of duties and least privilege. Sixty-five percent of organizations could either not prove, or are unsure, whether privileged users were tampering with sensitive data. There needs to be cross-checking of privileged access. Within today s enterprises, no other type of professional is better equipped or more knowledgeable to deal with data security than database professionals. These superheroes understand where the risks are, and how these risks can ultimately affect their organization. In an era in which information is the most precious resource, database professionals must take a leadership role in helping to prepare and protect these assets. With great power, comes great responsibility.
27 27 DEMOGRAPHICS Figure 33: Respondents Organizations By Number of Employees 1 to 100 employees 14% 101 to 500 employees 14% 501 to 1,000 employees 7% 1,001 to 5,000 employees 19% 5,001 to 10,000 employees 13% >10,000 33% Figure 34: Number of Databases at Respondents Sites 0 to 10 21% 11 to % 101 to 1,000 28% 1,001 to 5,000 8% >5,000 10%
28 28 Figure 35: Respondents Primary Job Titles Database administrator (DBA) 44% Director/manager of IS/IT or 11% computer-related function IT Consultant 8% Architect/engineer (security, systems, 7% data, etc.) IT operations manager 5% Chief/VP (CIO, CSO, CTO, IT, IS, etc.) 5% Analyst/systems analyst 4% Programmer/developer 3% Project manager 3% Systems administrator 2% Applications administrator 1% Manager of a business unit 1% (other than computer-related function) Executive manager 1% Security manager 1% Other 4%
29 29 Figure 36: Respondents Primary Industries IT services/consulting/system integration 21% Government (all levels) 12% Education (all levels) 11% Utility/telecommunications/transportation 9% Financial services 8% Software/application development 7% Manufacturing 6% Healthcare/medical 4% Insurance 4% Business services 3% Nonprofit 3% Retail/distribution 3% High-tech manufacturing 2% Consumer services 1% Energy (oil, gas, etc.) 1% Other 5%
EFFICIENCY ISN T ENOUGH: DATA CENTERS LEAD THE DRIVE TO INNOVATION
EFFICIENCY ISN T ENOUGH: DATA CENTERS LEAD THE DRIVE TO INNOVATION 2014 IOUG IT RESOURCE STRATEGIES SURVEY By Joseph McKendrick, Research Analyst Produced by Unisphere Research, a Division of Information
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
Managing the Ongoing Challenge of Insider Threats
CYBERSECURITY IN THE FEDERAL GOVERNMENT Managing the Ongoing Challenge of Insider Threats A WHITE PAPER PRESENTED BY: May 2015 PREPARED BY MARKET CONNECTIONS, INC. 11350 RANDOM HILLS ROAD, SUITE 800 FAIRFAX,
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
10 Hidden IT Risks That Threaten Your Practice
(Plus 1 Fast Way to Find Them) Your practice depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
The problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Change Management. Why Change Management? CHAPTER
Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements
The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015
The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security
HITRUST CSF Assurance Program
HITRUST CSF Assurance Program Simplifying the information protection of healthcare data 1 May 2015 2015 HITRUST LLC, Frisco, TX. All Rights Reserved Table of Contents Background CSF Assurance Program Overview
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Complete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
2013 BIG DATA OPPORTUNITIES SURVEY
2013 BIG DATA OPPORTUNITIES SURVEY By Joseph McKendrick, Research Analyst Produced by Unisphere Research, a Division of Information Today, Inc. May 2013 Sponsored by 2 TABLE OF CONTENTS Executive Summary.............................................................3
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
Compliance Management, made easy
Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA
White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting
Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant
Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant Comply Prove it! Reduce the risk of security breaches by automating the tracking, alerting and reporting
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Database Security & Auditing
Database Security & Auditing Jeff Paddock Manager, Enterprise Solutions September 17, 2009 1 Verizon 2009 Data Breach Investigations Report: 285 million records were compromised in 2008 2 Agenda The Threat
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
The SQL Injection Threat Study
The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April 2014 1 The SQL Injection Threat Study Presented by Ponemon Institute, April
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
