How To Protect A Data Warehouse From Attack
|
|
|
- Isabella Parrish
- 5 years ago
- Views:
Transcription
1 Data Warehousing > Database Security Features in Teradata Database By: Jim Browning and Adriaan Veldhuisen
2 Table of Contents Executive Summary 2 Introduction 3 Teradata Solutions Methodology 4 Teradata Database Security Features 5 Authentication 5 Authorization 8 Data Security 10 Auditing and Monitoring 11 Assurance 12 Teradata Database Security Advantage 12 Conclusion 13 Endnotes 13 Executive Summary The Teradata Database supports many important features that are designed to enhance the security of an enterprise data warehouse. These security features include: > User-level security controls. > Increased user authentication options. > Support for security roles. > Enterprise directory integration. > Network traffic encryption. > Auditing and monitoring controls. This white paper provides an overview of the security features and describes scenarios for their usage. The paper will also discuss the independent evaluation of the Teradata Database to the International Common Criteria for Information Technology Security Evaluation (ISO 15408) standard. EB-1895 > 1007 > PAGE 2 OF 13
3 Introduction Increased public attention to security is driving the restructuring of security requirements. The role that IT will play in helping address these challenges will be significant. However, IT departments are under pressure to cut their operating costs, while being asked to improve and standardize information security. Teradata Corporation s security approach will assist Teradata Database Security Administrators who are facing these new challenges. Legislated requirements, government regulations, and industry standards all result in a continually evolving security landscape. Following are examples that are driving increased requirements for data warehouse security across many industries and geographies: European Union Privacy Directives The principles established by the European Union (EU) Privacy Directives serve as the foundation for many international privacy and security laws. These directives require the use of appropriate technical and organizational measures to ensure confidentiality and security of processing of personal data. Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates standards and requirements for maintaining and transmitting health information that identifies individual patients, and compliance is required by all U.S. health care organizations that maintain or transmit electronic health information. A Security Rule establishes specific security requirements for authorization, authentication, audit trail requirements, secure data storage and transmission, and data integrity. Gramm-Leach-Bliley Act The Gramm-Leach-Bliley Act of 1999 (also known as the Financial Modernization Act) requires that financial institutions adopt policies and procedures to provide for the protection of financial information that identifies individual consumers. Such procedures must protect against any anticipated threats or hazards and protect against unauthorized access which could result in substantial harm or inconvenience to a customer. Sarbanes-Oxley Act The Sarbanes-Oxley Act of 2003 includes a number of reforms intended to increase corporate responsibility, improve financial disclosures, and protect against corporate and accounting fraud. While this legislation does not mandate the use of specific security controls, Section 302 does require that internal controls be established to protect data from both internal and external threats, and Section 404 requires that corporations report on the effectiveness of those controls. Also, Section 409 requires the disclosure of any material changes to the financial condition or operation of the company (potentially to include a major security compromise). Personal Information Protection Act (Japan) The Japanese Personal Information Protection Law requires that companies operating in Japan develop and implement information privacy and security controls for any databases or documents containing consumer or employee information. This obligation will be applied to any party who stores and uses more than 5000 persons information in total in the party for its business. Japan s Ministry of Economy Trade and Industry (METI) has issued specific guidelines for maintaining the security of these databases. Payment Card Industry Data Security Standard Developed by Visa and MasterCard, the Payment Card Industry Data Security Standard applies to merchants and service providers that store, transmit, or process credit card transactions. The standard outlines 12 specific requirements that must be implemented to protect cardholder information. EB-1895 > 1007 > PAGE 3 OF 13
4 Security, as an aspect of IT control requirements, defines an attribute of information systems, and includes specific policy-based mechanisms and assurances for protecting the confidentiality and integrity of information, the availability of critical services and, indirectly, privacy. Data in a data warehouse must be protected at both ends of a transaction (user and enterprise). Figure 1 depicts the relationships in simple terms. These concepts and relationships are taken from the Common Criteria ISO standard specifying the Privacy Class of Common Criteria. It proposes that all security specifications and requirements should come from a general security context. This context states that security is concerned with the protection of assets from threats, where threats are categorized as the potential for abuse of protected assets. Data warehouse security requires protection of the database, the server on which it resides, and appropriate network access controls. Teradata highly recommends that customers implement appropriate network perimeter security controls (e.g., firewalls, gateways, etc.) to protect network access to a data warehouse. Additionally, for data warehouse systems deployed on Microsoft Windows -based operating systems, Teradata highly recommends that such Owners Threat Agents give rise to impose may be aware of systems be protected by antivirus software and up-to-date virus definition files. The remainder of this paper will specifically discuss some of the security features that can be used to effectively secure a Teradata Database. Teradata Solutions Methodology Safeguards that may be reduced by that exploit Threats wish to abuse and/or may damage Teradata believes that organizations with data warehouses that consolidate and centralize the management of sensitive data are in a much better position to manage security and privacy than those with such data spread across multiple value wish to minimize Vulnerabilities leading to that increase to reduce that may possess to Risk Assets Figure 1. Determining a Basis for Change operational or data mart systems. To that end, Teradata has developed an end-to-end capability for designing and implementing secure, privacy-aware data warehouses. Teradata Solutions Methodology, as depicted in Figure 2, is a formal, proven, patented approach to data warehousing based on integrated processes and customized tools refined through use at the world s most successful data warehouse implementations. Teradata Solutions Methodology comprises a comprehensive set of privacy and security project features. 1 Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model EB-1895 > 1007 > PAGE 4 OF 13
5 For example, the Analyze phase includes services to specifically collect and analyze all of the information necessary to integrate data warehouse security into an existing security infrastructure. It considers any current processes by which security and privacy may be implemented for new systems and applications, the information security and privacy infrastructure already in place, and any tools used. The Design phase ensures that the database design and data model fully address all identified privacy and security requirements. Such tasks include identifying data fields that reveal customer identity, identifying data fields containing personal data, identifying data fields containing special categories of data, and adding consent flags for individual privacy preferences that are tied to personal data fields and their uses. The Build phase creates the database administration processes for security and privacy. Implementation includes the definition of Views for making personal data anonymous for analysis purposes. This methodology, implemented by experienced Teradata consultants, ensures that a Teradata Warehouse implementation appropriately considers the impact of all privacy and security requirements. Teradata Database Security Features Teradata is continuously adding security features to its products. We are committed Opportunity Assessment Enterprise Assessment Enterprise Information Governance Planning STRATEGY RESEARCH ANALYZE DESIGN Business Value Data Warehouse Maturity Information Sourcing DBMS Neutral Services Application Requirement Logical Model Data Mapping Infrastructure & Education to driving significant benefit for our customers now and into the future, and to achieving our vision for a leadership role in data warehouse security. The following sections describe some of the security features that aid Teradata Database clients in effectively implementing a data warehouse security policy, and highlight some attributes and intended usage of these features. Authentication Authentication refers to the process of establishing the legitimacy of a user before allowing access to database resources. Proper authentication of users is fundamental to ensuring the security of any Implementation Iterate Project Management System Architecture Package Adaptation Custom Component Test Plan Education Plan EQUIP Hardware Installation Software Installation Support Management Operational Mentoring Technical Education BUILD Physical Database ECTL Application Information Exploitation Operational Applications Backup & Recovery User Curriculum Production INTEGRATE Components for Testing System Test Production Install Initial Data Acceptance Testing User Training Value Assessment MANAGE Capacity Planning System Performance Business Continuity Data Migration System Relocation Hardware/ Software Upgrade Availability SLA System DBA Solution Architect Analytical Models Figure 2. Teradata Solutions Methodology database system. The Teradata Database provides multiple options for authenticating database users. Additionally, custom authentication methods can be developed and deployed to further enable integration of a Teradata solution into diverse security management environments. All supported authentication methods are described by a set of properties that can be managed by a security administrator. These properties allow for the security administrator to establish default authentication methods and to restrict or limit the methods that may be selected by a database user. Other properties may similarly be managed by the security administrator. EB-1895 > 1007 > PAGE 5 OF 13
6 User-Level Security Controls Typically, a database user must provide a valid username and password as part of the logon string in order for a database session to be established. However, properly securing such password-based schemes requires that a security administrator be able to ensure that passwords are regularly changed, are sufficiently complex, and that effective precautions can be taken to protect against attempts to guess user passwords. As such, the Teradata Database supports a rich set of password security controls that can be specified at either the user level or the system level. This is important since it is often desirable to establish and enforce different password management policies for different types of database users (e.g., batch versus interactive). User-level controls are implemented using the User Profiles feature that was introduced in Teradata Warehouse 7.0. In this manner, profiles specifying specific password management policies can be defined and assigned to individual users, groups of users, or an entire enterprise. When a user logs on to the Teradata Database, any associated profile password controls will take effect. If no associated profile password controls have been defined, then the system-level controls will take effect. Figure 3 describes the password security controls that are supported in Teradata Database V2R6.1 (reference the Security Administration reference manual for implementation specifics 2 ). Usage Controls Password Expiration Password Reuse Maximum Logon Attempts Password Lockout Time Format Controls Password Length Password Construction Description Windows Network Authentication Effective user authentication is a foundation of a database system s security services. However, secure authentication may be compromised in large, heterogeneous networks where users may be required to remember multiple user names and passwords. To address this issue, a single sign-on capability can be used to allow network users to seamlessly access authorized network resources and applications, including an enterprise data warehouse, with a single authentication Allows the security administrator to define a time span during which a password is valid. After the time elapses, the user must change the password. Allows the security administrator to define the time span that must elapse before a previously used password can be reassigned to a user. Allows the security administrator to define the number of erroneous sequential logon attempts a user is allowed before the user is blocked from further logon attempts. Allows the security administrator to set the user lock time duration after the user has exceeded the maximum number of logon attempts. Description Allows the security administrator to define the minimum and maximum number of characters required in a valid password string. Allows the security administrator to specify whether alpha characters, digits, special characters, and a combination of upper- and lowercase characters are to be allowed or required in the password string. Also, allows the security administrator to specify whether the username should be allowed to be included in the password string. Figure 3. Password Controls that is performed upon initial network access. This capability improves the productivity of network users, reduces the cost of network operations, and, ultimately, improves network security. Further, security is improved by eliminating the need for an application to declare or store a password on the client system. For homogeneous Windows environments, the Teradata Database, since Release V2R4.1, supports a single sign-on capability through integration with Windows Network Authentication. Upon connection EB-1895 > 1007 > PAGE 6 OF 13
7 User Domain 1 Domain 2 Logon to Domain 1 MS Active Directory Server Trust Relationship MS Active Directory Server These systems typically store and manage user information through a directory service that supports the Lightweight Directory Access Protocol (LDAP). LDAPenabled applications, services, and databases can readily leverage a single, centralized repository of user information to control user access. Logon to Database Teradata Server Authenticate User Logon to Database to the Teradata Database, database users are not required to provide a username and password as part of the logon protocol. Rather, the system will determine the user s Windows identity and authenticate the user using the underlying Microsoft Security Service Provider Interface (SSPI). Users may be authenticated using either the Windows NT LAN Manager (NTLM) or Kerberos protocols as appropriate. Figure 4 depicts the relationship between users, the Teradata Database server, and Microsoft Active Directory in implementing Windows single sign-on. LDAP Authentication For enterprises where users may have Logon to Domain 2 User Figure 4. Windows Network Authentication access to many applications and systems, it is common to manage separate user accounts for each application resulting in redundant and/or inconsistent data and increased user management costs. This lack of centralization also represents a significant security risk because unused or expired accounts and privileges are subject to misuse. As such, many enterprises are adopting centralized security management frameworks that provide for a single point of administration for internal and external users, configuration information, and security policies. Such systems can often simplify the process of creating, modifying, and deleting user accounts, as well as authorizing access to protected resources. The Teradata Database supports an LDAP authentication method that allows for authentication of database users against a centralized LDAP directory rather than using credentials maintained in the data dictionary. This method authenticates a user (by means of the user s distinguished name and password) through a secure LDAPv3 bind to the directory. This feature was introduced in Teradata Warehouse 8.0. Extensible User Authentication Many enterprises have made significant investments in infrastructure technologies, such as user, identity, or access management systems, which provide enhanced support for the authentication and authorization of user access to systems and applications. Many of these systems also support single sign-on architectures wherein session credentials are created upon initial log on to a network or to a supported application. Subsequent logons to other supported applications can use the session credentials for authentication and authorization without requiring additional interaction with the user. While the Teradata Database offers a number EB-1895 > 1007 > PAGE 7 OF 13
8 of options for authenticating database users, it is often desirable to integrate the authentication with that provided by such access management systems. With Teradata Warehouse 8.0, the Teradata Database supports an Extensible User Authentication architecture that allows for custom authentication methods to be developed (with the assistance of Teradata Professional Services) and used for authentication of database users. This architecture is built around the use of standard application programming interfaces, such as the Generic Security Services API (GSS-API) and the Security Service Provider Interface (SSPI). As such, new methods can be developed and deployed without requiring new releases of base Teradata client and database software. The architecture readily accommodates different types of credentials (e.g., tokens and certificates) that can be used to identify and authenticate a user. Moreover, custom methods can be developed to implement agents that interface to external access or policy servers thereby extending the authentication or single sign-on services provided to include the Teradata Database. Teradata Warehouse 8.1 provides a Software Developer s Kit (SDK) to support easier development and testing of custom authentication methods. The SDK includes a test framework that enables initial development and testing of new authentication methods without requiring installation on an active system. Authorization Ensuring appropriate and authorized access to data is a major objective and concern in database security. The Teradata Database contains a robust set of fully integrated system access control capabilities. The mission of security administration on a Teradata Database system is to prevent unauthorized persons from accessing the system and its resources, as well as permitting legitimate users access to those resources to which they are authorized. The Teradata Database supports a discretionary access control policy in which access to database objects is restricted based upon the identity of users and/or groups to which they belong. The controls are discretionary in the sense that a user with certain access permissions is capable of passing those permissions on to other users. Security Roles One of the most challenging problems in managing large data warehouse systems is the complexity of security administration. Often, security administration is costly and prone to errors because security administrators must specify access controls individually for each database user. Role-based access control (RBAC) is a technology that can reduce the complexity and cost of security administration in large data warehouse environments. With RBAC, security is managed at a level that more closely corresponds to an organization s structure. Each database user may be assigned one or more roles with each role assigning access rights or privileges that are permitted to users in that role. Security administration with RBAC requires determining the operations that must be allowed by users in particular jobs and assigning those users to the proper roles. RBAC effectively manages complexities resulting from differing roles or hierarchies, thereby easing the task of security administration. Introduced in Teradata Warehouse 7.0, the Teradata Database provides support for Security Roles, which are used to define access privileges on database objects. For example, a user who is a member of a role can access the specific views for which the role has been granted appropriate access rights or privileges. For enterprise data warehouses that provide access to many users, the use of roles will significantly simplify access rights administration and enhance overall security. A security administrator can create different roles for different job functions and responsibilities. For example, a security administrator can grant rights on a clinician view to a role and have these rights automatically applied to all users assigned to that role (Figure 5). Management of access rights is simplified by allowing grants and revokes of multiple EB-1895 > 1007 > PAGE 8 OF 13
9 Users Roles Views Base Tables policies that may be enforced by applications to authorize user access to enterprise resources. Clinician Clinician Clinician Clinician Researcher Researcher Researcher Lab Analyst Lab Analyst Lab Analyst Lab Analyst access rights with one request. This is important when a user changes job functions (role) within the company. Should a job function need a new access right, it can be granted to the role and would be effective immediately for all users with that role. To effectively use the Security Roles feature, individual rights must be converted into role rights. This requires creating the required roles and granting appropriate rights to each role. Roles can then be granted to users and users assigned their default roles. Finally, all individual access rights that have been replaced by role rights should be revoked from the users to ensure that all access Figure 5. Security Roles rights are only granted through the role definition. Typically, only one role will be the session s current or active role. Enabled roles are the current role plus any nested roles. At logon, the current role is the user s default role. Alternatively, it is possible to enable all roles granted to a user for a session. Directory Integration As noted earlier, many enterprises are adopting centralized security management frameworks, built using LDAP directory services, which provide for a single point of administration for users and associated security policies. Often, with such systems, the directory maintains access control With Teradata Warehouse 8.0, Teradata has defined directory schema attributes and objects that allow for the extension of a directory schema to map the distinguished name of a directory user to a Teradata Database permanent user. Such users inherit the roles assigned to the mapped permanent user. However, additional external roles can be created and assigned to the directory user. External roles assigned to a directory user can be used in addition to any roles inherited from the mapped permanent user. A user profile may be created and assigned to a directory user in a similar manner. These schema extensions are provided for popular directory services such as Microsoft Active Directory and Sun Java System Directory Server. Upon successful authentication, Teradata Database will enable the specified security role(s) and user profile for the database session. Normally, users are defined in the database via a CREATE USER request. However, some data warehouse environments may support large numbers of users that do not have unique system requirements (such as the need for PERM space or unique SPOOL or TEMP space allocations). To simplify the management of such users, the Directory Integration feature allows for user access without requiring the creation of a database instance for every user. Users that are not EB-1895 > 1007 > PAGE 9 OF 13
10 mapped in the directory to an existing permanent Teradata Database user may be mapped to a system-defined user called EXTUSER. Access rights for such external users are determined by the user s directory-assigned security role(s). Space allocations may default or can be determined by the user s directory-assigned user profile. With Teradata Warehouse 8.1, the LDAP authentication method properties can be configured to allow for directory users that correspond to a user defined in the database to log on without requiring directory schema extensions. In this scenario, authorization to access database objects is managed entirely within the database. Tools are provided to validate directory content and the operation of the directory when using the Teradata schema extensions. Data Security It is important to implement appropriate controls to protect sensitive data. Data can be vulnerable when transmitted over non-secure networks or when appropriate access controls have not been enabled for stored data. The Teradata Database provides facilities to manage the encryption of sensitive data when transmitted over non-secure networks. Further, rowand column-level security can be implemented readily using database views. Network Traffic Encryption The Teradata Database and associated client applications and utilities typically operate in a traditional client/server environment. If clients are accessing the database server over non-secure networks, there is a risk that data may be compromised by a malicious user who is snooping on the network. To mitigate this risk, Teradata Warehouse 8.0 provides for encryption of data transmitted between client applications and the Teradata Database. Encryption is a CPU-intensive function that can negatively affect the performance of some operations. As such, its use should be carefully considered. The use of encryption is determined by the user through the client application and can be controlled on a per request basis. As such, the user has complete flexibility in the use of encryption to protect payloads transmitted over a network and to minimize any negative performance impacts. Alternatively, the client interfaces can be configured such that all sessions between the client applications and the database server are encrypted. The security provided by encryption is dependent upon the strength of the encryption algorithm and the security of the key used to perform the encryption. The Teradata Database uses the public-key based Diffie-Hellman key agreement protocol to generate a secure 128-bit key for use by the client and the database. A unique key is generated for each database session. The key generation is built into the underlying client/server communication protocol thereby eliminating the need for complex key management processes. Strong encryption is accomplished using the industry-standard Advanced Encryption Standard (AES) algorithm. In networked environments, a password transmitted from a client application to a database server may pose a security risk. If the password is transmitted in clear text over a non-secure network, there is a risk it could be intercepted by a malicious user snooping for data on the network. To protect against this, the Teradata Database client tools and utilities always encrypt the logon string (including username and password) that is transmitted to the Teradata Database server. For compatibility purposes, the client and server are not required to be at the same version level. However, only the security features common to each version level can be used. This can allow for security features to be utilized according to individual client needs. Row- and Column-Level Security Database views are used to restrict the rows and columns that users (or groups of users) can access. Views are part of the SQL standard and can be thought of as virtual tables that can be accessed as if they were physical tables to retrieve data from the database. Views can be defined to reference columns or rows from underlying views and/or tables. A view does not actually contain data but rather is used to provide users with their own logical view of the data within the database. Figure 6 EB-1895 > 1007 > PAGE 10 OF 13
11 depicts an example from the healthcare industry where researchers, clinicians, lab Clinician analysts, and business analysts each represent a specific group of users with their own view of the database. These views enforce different security policies and access rights and privileges by limiting the data elements that are visible by each view. Views Teradata Database support for views is particularly high performance because the optimizer generates optimized SQL for selecting the appropriate columns and rows from the underlying base tables. Additionally, query access through views can generate very complex SQL expressions, which further exploit the inherent parallelism of the Teradata Database architecture. Researcher Base Tables Lab Analyst Business Analyst Figure 6. Database Views Auditing and Monitoring An important aspect of any security implementation is the creation and monitoring of a record of system activity to detect abnormal activity and to ensure that users are held accountable for their actions. To detect intruders and ensure data integrity, the Teradata Database provides a comprehensive set of auditing capabilities. A security administrator can periodically audit events on the Teradata Database to effectively detect potential attempts to gain unauthorized access to database resources or attempts to alter the behavior of the auditing facilities. The Teradata Database automatically audits all logon and logoff activity. However, the security administrator can also configure the system s Access Log to log any successful and/or unsuccessful attempt to access any or all database objects by any or all database users. Also, the Access Log has controls to filter the logging by frequency of access or type of access. Teradata Database security features include the option to log the SQL expression that was used to perform the access to a database object. As such, all accesses are effectively audited. Parameterized macros or triggers may be used to further customize or refine the auditing. Triggers are particularly useful when creating audit logs based upon specific data or content-based rules. All audit information is stored in protected database tables within the data dictionary and access to the information requires appropriate access rights and privileges. The audit records can be viewed through ad hoc queries or with any appropriate application or query tool. Additionally, Teradata Manager includes facilities that enable the security administrator to access preconfigured reports or to generate custom reports from the Access Log. Assurance Assurance refers to a level of confidence that a product s security features have been evaluated against a well-defined and widely accepted set of security requirements. Security evaluations are conducted by independent, licensed, and accredited organizations most often to the require- EB-1895 > 1007 > PAGE 11 OF 13
12 ments of a specific industry standard. A security evaluation provides assurance through an analysis of a system s security functions using functional and interface specifications, guidance documentation, and the high-level design of the system to understand the security behavior. Independent testing of the security functions supports the analysis, evidence of developer testing based on a functional specification, selective independent confirmation of the developer test results, and a search for obvious vulnerabilities. Assurance is also provided through a configuration list for the system and evidence of secure delivery procedures. Security Evaluation under Common Criteria Teradata Database V2R5.0.2 has been independently evaluated to the requirements of the Common Criteria for Information Technology Security Evaluation (Common Criteria) standard. The Common Criteria is a multi-part standard that aligns with the International Standard ISO/IEC 15408:1999, which is meant to be used as a basis for evaluating security properties of Information Technology (IT) products and systems. The Common Criteria are defined by seven governmental security organizations known as the Common Criteria Project Sponsoring Organizations represented by Canada, France, Germany, the Netherlands, United Kingdom, the U.S. National Institute of Standards and Technology, and the U.S. National Security Agency. The security evaluation of the Teradata Database was conducted by the Booz Allen Common Criteria Test Lab under the National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme (CCEVS). The Teradata Database was evaluated against 31 separate security functional requirements that describe the security behavior of the system 3. These requirements spanned multiple functional classes including Identification and Authentication, User Data Protection, Access, Security Audit, Security Management, and others. While the evaluation considered the design of the system, it also considered processes used for testing and installation and included a vulnerability analysis. As such, this evaluation provides a high level of assurance in the security design and implementation of a Teradata Database system. This evaluation is intended to satisfy the requirements of those customers (primarily government agencies) that are required to procure only IT systems for which the security robustness has been formally evaluated and validated. Teradata Database Security Advantage Teradata has a defined architecture for protecting personal information or other confidential data within a database. Important patents protect this intellectual property: > U.S. Patent # 6,253,203 Privacyenabled database (issued June 26, 2001) > U.S. Patent # 6,275,824 System and method for managing data privacy in a database management system (issued August 14, 2001) > U.S. Patent # 6,438,544 Method and apparatus for dynamic discovery of data model allowing customization of consumer applications accessing privacy data (issued August 20, 2002) > U.S. Patent # 6,480,850 System and method for managing data privacy in a database management system including a dependently connected privacy data mart (issued November 12, 2002) The architecture represented by these patents leverages core Teradata Database strengths such as: > The ability to store and manage large volumes of detailed data through support for normalized data models, an infrastructure that efficiently enables multiple views, and data models that are easily extended. > A high-performance implementation that makes views practical for privacy. Optimized SQL selects appropriate columns and rows from base tables, and complex SQL expressions exploit Teradata Database parallelism. > A security mechanism that can deny access to restricted views or macros. EB-1895 > 1007 > PAGE 12 OF 13
13 Teradata.com > Access logging that provides a privacy audit trail and includes options to log all accesses (or access attempts) to a table (or view, macro), and log the associated SQL expression. Conclusion The Teradata Database provides a rich set of security controls for managing, protecting, and auditing access to stored data. These capabilities include extensive password controls, support for multiple authentication methods, access controls, high-performance database views, network traffic encryption, access logging, and audit reporting. New industry regulations, especially in the retail, financial services, and healthcare industries, present increased challenges for securing an enterprise s information assets. The security capabilities described in this paper can assist Teradata Database security administrators in meeting these new challenges. Endnotes 1 Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model 2 Teradata Database Security Administration 3 Teradata Relational Database Management System Version 2, Release Security Target (Version 1.0) niap.nist.gov/cc-scheme/st/ ST_VID7001.html This document, which includes the information contained herein, is the exclusive property of Teradata Corporation. Any person is hereby authorized to view, copy, print, and distribute this document subject to the following conditions. This document may be used for non-commercial, informational purposes only and is provided on an AS-IS basis. Any copy of this document or portion thereof must include this copyright notice and all other restrictive legends appearing in this document. Note that any product, process or technology described in the document may be the subject of other intellectual property rights reserved by Teradata and are not licensed hereunder. No license rights will be implied. Use, duplication, or disclosure by the United States government is subject to the restrictions set forth in DFARS (c) (1) (ii) and FAR Microsoft and Windows are registered trademarks of Microsoft Corporation. Teradata continually enhances products as new technologies and components become available. Teradata continually improves products as new technologies and components become available. Teradata, therefore, reserves the right to change specifications without prior notice. All features, functions, and operations described herein may not be marketed in all parts of the world. Consult your Teradata representative or Teradata.com for more information. Copyright by Teradata Corporation All Rights Reserved. Produced in U.S.A. EB-1895 > 1007 > PAGE 13 OF 13
HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved.
HIPAA Compliance and Wireless Networks White Paper HIPAA Compliance and Wireless Networks 2005 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
HIPAA Compliance and Wireless Networks
HIPAA Compliance and Wireless Networks White Paper 2004 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property of Cranite Systems, Inc. and/or
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
Choosing an SSO Solution Ten Smart Questions
Choosing an SSO Solution Ten Smart Questions Looking for the best SSO solution? Asking these ten questions first can give your users the simple, secure access they need, save time and money, and improve
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Introduction to the HP Server Automation system security architecture
Introduction to the HP Server Automation system security architecture Technical white paper Table of contents Introduction to the HP Server Automation system security architecture... 2 Enforcing strict
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Supplier IT Security Guide
Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Secure Configuration Guide
Secure Configuration Guide Oracle Health Sciences Empirica Healthcare 1.0 Part number: E49242-01 Copyright 2013, Oracle and/or its affiliates. All rights reserved. The Programs (which include both the
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
White Paper. PCI Guidance: Microsoft Windows Logging
PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles
Oracle Health Sciences Network Security Guide Release 2.0.0.0 E50290-02 September 2015 1 Introduction The main challenge sponsors face in clinical trials is the elapsed time from the start of the protocol
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Overview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
Cyber-Ark Software and the PCI Data Security Standard
Cyber-Ark Software and the PCI Data Security Standard INTER-BUSINESS VAULT (IBV) The PCI DSS Cyber-Ark s View The Payment Card Industry Data Security Standard (PCI DSS) defines security measures to protect
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
SQL Server 2012 Gives You More Advanced Features (Out-Of-The-Box)
SQL Server 2012 Gives You More Advanced Features (Out-Of-The-Box) SQL Server White Paper Published: January 2012 Applies to: SQL Server 2012 Summary: This paper explains the different ways in which databases
Integrated Authentication
Integrated Authentication Information Security Introduction Information security has become an increasingly visible and important topic to companies. Driven by a number of highly publicized security breaches
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Active Directory Integration with Blue Coat
The Web Security Authority. TM Active Directory Integration with Blue Coat NOTE: This techbrief is applicable when using NTLM under Windows 2000 Server. Introduction Windows 2000 server utilizes Active
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
