Database Monitoring and Security Solutions. Olivier Gillet ogillet@imperva.com



Similar documents
White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Networking and High Availability

Networking and High Availability

Auditing Data Access Without Bringing Your Database To Its Knees

Implementing Sarbanes-Oxley Audit Requirements WHITE PAPER

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

White Paper. Managing Risk to Sensitive Data with SecureSphere

Securely maintaining sensitive financial and

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

FISMA / NIST REVISION 3 COMPLIANCE

How To Manage Security On A Networked Computer System

White Paper. Imperva Data Security and Compliance Lifecycle

Enterprise Security Solutions

How To Manage Sourcefire From A Command Console

The Comprehensive Guide to PCI Security Standards Compliance

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

CorreLog Alignment to PCI Security Standards Compliance

Guideline on Auditing and Log Management

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Vulnerability Management

Vistara Lifecycle Management

FormFire Application and IT Security. White Paper

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Securing SharePoint 101. Rob Rachwald Imperva

The New PCI Requirement: Application Firewall vs. Code Review

End-to-End Application Security from the Cloud

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Guidelines for Web applications protection with dedicated Web Application Firewall

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Network Security and Vulnerability Assessment Solutions

Secret Server Qualys Integration Guide

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

NMS300 Network Management System

Security for PCI Compliance Addressing Security and Auditing Requirements for In-scope Web Applications, Databases and File Servers

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Enforcive / Enterprise Security

Websense Support Webinar: Questions and Answers

Enterprise-Grade Security from the Cloud

Enterprise Database Security & Monitoring: Guardium Overview

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Best Practices for PCI DSS V3.0 Network Security Compliance

McAfee Database Security. Dan Sarel, VP Database Security Products

Improving PCI Compliance with Network Configuration Automation

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

How to Secure Your SharePoint Deployment

10 Things Every Web Application Firewall Should Provide Share this ebook

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

TOTAL VIEW ONE Technical FAQ

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

MySQL Security: Best Practices

RAVEN, Network Security and Health for the Enterprise

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Automate PCI Compliance Monitoring, Investigation & Reporting

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

End-user Security Analytics Strengthens Protection with ArcSight

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Powered by. Incapsula Cloud WAF

Imperva SecureSphere Data Security

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IT Security & Compliance. On Time. On Budget. On Demand.

PCI Requirements Coverage Summary Table

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

An Oracle White Paper January Oracle Database Firewall

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

AN OVERVIEW OF VULNERABILITY SCANNERS

How To Achieve Pca Compliance With Redhat Enterprise Linux

Peter Dulay, CISSP Senior Architect, Security BU

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Network Access Control in Virtual Environments. Technical Note

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Enabling Security Operations with RSA envision. August, 2009

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

March

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

TRIPWIRE NERC SOLUTION SUITE

Real-Time Database Protection and. Overview IBM Corporation

Information Technology Solutions

Achieving PCI-Compliance through Cyberoam

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

SecureSphere Data Security Suite

Installing and Configuring Guardium, ODF, and OAV

Transcription:

Database Monitoring and Security Solutions Olivier Gillet ogillet@imperva.com

Application Data Security USE CASES DATA ACTIVITY MONITORING REAL-TIME DATA PROTECTION DATABASE AUDITING PCI COMPLIANCE WEB APPLICATION SECURITY AUTOMATED COMPLIANCE REPORTING ENTERPRISE APPLICATION SECURITY DATABASE SECURITY - CONFIDENTIAL -

Achieving Security & Compliance Assess Discover servers and data Test configuration Evaluate inherent risks Assess who uses the data and applications and how Measure Built in & custom reports Roll-up & drill down of data Security event analysis Compliance workflow IMPERVA ADDRESSES THE ENTIRE LIFE CYCLE Set Policies/Controls Set policies automatically and quickly Keep up with changes Configurable policies and controls based on situation Monitor and Enforce Ensure separation of duties Ensure end user accountability Capture full details Provide security at all layers Alert/block in real-time 3 - CONFIDENTIAL -

Assess Know your environment

Know the environment Complete Assessment Should Include: Server and Sensitive Data Discovery Find rogue servers and the sensitive information they contain Configuration Risks Discover misconfigurations, bad practices, negligent policies and unauthorized usage Inherent Risks Find out about OS, database and infrastructure weaknesses that cannot be mitigated by processes or system setup Identify Unique Users and Data Usage Risk An ounce of prevention is worth a pound of cure Manage risk at its source by knowing which users are accessing sensitive data

Database hosts & sensitive data Know Where Your Sensitive Data Is Find & identify rogue servers & databases Servers created for testing without authorization Databases replicated onto individual desktops/laptops Unauthorized services (web, SOA) Discover/validate location of sensitive data Personal: name, email, SSN Financial: CC numbers System: userid, password Custom formats e.g. MSISDN CONFIDENTIAL - Imperva

Database security baseline Implement Best Practice for DB Configuration Remediate risks caused by bad configurations Discover mis-configurations, bad practices, negligent policies and unauthorized usage Identify threats & vulnerabilities Risk assessment & response Vulnerability Assessments System configuration Presence of inherent SW risks Users, roles, permissions Application Defense Center (ADC) Industry recognised security research Always keeps you up to date CONFIDENTIAL - Imperva

Accounted & approved? Identify and Track Changes Track new user accounts and permissions Identify inactive & disabled accounts Test for and reconcile database configuration changes Classify privileged operations Attribute operations to the groups responsible (DBAs, developers, user admin etc) Report on DDL, TCL, DCL Maintain integrity of sensitive data and control access methods CONFIDENTIAL - Imperva

Knowing the IT holes Assessment Reporting

Defining the Rules Breaking all Records of Complexity Constant Change Tables/Objects (~ Thousands) Users (~ Hundreds to Thousands) Application Profile Millions of dynamic items Automatically Built Automatically Tuned Even more information is needed User elements Source Apps, work schedules, IP addresses Behavior patterns SQL Queries, SQL Tables, Stored Procedures, etc. Applications (~ Tens to Hundreds) Databases (~ Tens ) Regulations (A Few) Too complex for manual implementation A profiling solution must create and update the policies without the need for human intervention

Defining the Rules Breaking all Records of Complexity Tables/Objects (~ Thousands) Users (~ Hundreds to Thousands) Applications (~ Tens to Hundreds) Databases (~ Tens ) Regulations (A Few) Constant Change An accurate profile must track tens of thousands of dynamic elements or more User elements Source Apps, work schedules, IP addresses Behavior patterns SQL Queries, SQL Tables, Stored Procedures, etc. Too complex for manual implementation A profiling solution must create and update the policies without the need for human intervention

SecureSphere Dynamic Profiling Automated Data Usage Assessment Dynamic Profiling builds the usage model Automatic creation of usage model More robust than a flat static baseline Administrator can view & edit User-centric usage model for each DB User and/or DB User Group DB & schemas accessed Objects queried Highlights sensitive & black-listed objects DML operations performed including SP execution Profile captures complete end-user behavior Source IP address & hostname Application used Operating System username CONFIDENTIAL - Imperva

Set Controls and Policies Usage Patterns for every User Comprehensive profile for every user All the way down to the individual query level for each user

Dynamically Profiles Applications Automatically learns protected Methodsapps Directories App structure Type Parameters, Elements and Form Acceptable Expected Fields Characters user behavior URLs by analyzing live Web traffic

Keep up with Changes SecureSphere Dynamic Profiling Cuts deployment time from months to days Eliminates ongoing administration burden 5-15 changes per week equals 5-30 man hours of configuration PROFILE CHANGES Understand the application and usage Adapt to on-going changes to the application DATE

Set Controls and Policies Define rules of engagement

Setting Controls and Policies: What s needed Detective controls understand suspicious activity and take immediate action to remediate undesired effects. Preventive controls prevent undesired usage by defining policies. Audit keep a record of activity for later inspection and use, regardless of the nature of the activity (suspicious, malicious or legitimate) The Challenge Complexity of problem similar to complexity of usage modeling Useful policies must be Multi-layer & Flexible (to meet different unique requirements) Granular (for accuracy) Easily managed (for large organizations with multiple roles)

Policy and Controls Model Policy Type Policy Use Compliance Business Applications Firewall Prohibited services Network signatures Known OS threats Protocol Detect audit evasion Ensure DB integrity Audit Trail of activities SOX 404 E-Business Suite Application signatures Known DB threats Extrusion prevention Correlation rules Rules-based exceptions SOX 404 E-Business Suite Dynamic profile Data access behaviours CONFIDENTIAL - Imperva

Enterprise management SecureSphere Policy Object Model Business relevant application grouping and policy management Application Groups Site Geographic entity Server Groups Cluster of IP hosts Services Listening on ports Policies Firewall Network signatures Protocol Audit Applications Host+URL prefix Applications DB+schema App signatures Correlation rules Dynamic profile CONFIDENTIAL - Imperva

Set Controls and Policies Detective and Preventive Controls Built in default reactions, which can be modified Always up to date through the ADC

Set Controls and Policies Profiles can be fine tuned Give only Least Use Privilege to each user. From control operations (which can be sensitive) to individual work schedules (which can be quite flexible)

Custom Policy creation Tweak controls along a wide variety of metrics and at all layers:

Audit policies -

Set Controls and Policies Custom Audit Controls and Policies Tweak controls along a wide variety of metrics and at all layers

Monitor and Enforce Implement the defined

Implement the rules Monitor and Enforce Monitoring Challenges: Separation of Duties Knowing the real End User Scalability to capture full detail Temper proof audit log Data usage visibility: Continuous auditing Ability to Alert and/or Block in Real-Time

Implement the rules Maintains Separation of Duties Audit Independence SecureSphere management is separate from database and server management Network-based Gateways Monitors activity via database communication protocols (TNS, DRDA, TDS) Processes and logs activity from local agent Host-based Agents Lightweight agent intercepts local database activity Passes activity to network-based gateway If agent is stopped gateway issues alert Audit Logs are tamperproof Role-based management Signed and Encrypted archival

SecureSphere Universal User Tracking Who Is Really Accessing Data? No re-writing of application or database code Direct User Tracking DB Username + OS Username + Hostname + IP + Application Web to DB User Tracking alex@imperva.com Webapp.company.com End-to-end real No real user user Knowledge Knowledge SQL Connection User Tracking alex@imperva.com Webapp.company.com SELECT WHERE ID = alex@imperva.com End-to-end real Limited real user user Knowledge Knowledge Shared & dedicated DB user connections CONFIDENTIAL - Imperva

Implement the rules What is the full picture? Most vendors summarize activity Report only DB action and table e.g. select customer_table Do not know if got credit card number and social security number Do not know how many records were fetched Why? lack of scalability SecureSphere collects FULL detail Collects the actual query (also aggregates up) E.g. Select credit_card_num, SSN from customer_table Addresses data loss/leakage with full response analysis Tracks/prevents sensitive data loss (Credit card, SSN, Acct info) Monitors/controls amount of data accessed How? scalable, distributed architecture for activity auditing

Trusted audit data Integrity of the Audit Control Audit data integrity Litigation quality raw SQL not a normalized interpretation Separation of duty not dependant upon DBAs, native audit trails, triggers or transaction logs Tamperproof hardened appliance & signed/encrypted archive Track adds, deletes and changes Internal System Events Audit & monitoring configuration Rules and Policies Databases/objects that are being audited SecureSphere users & roles Detect tampering of DB Agents Disabling DB Agents DB Agent configuration CONFIDENTIAL - Imperva

What auditors want Achieving Continuous Auditing Paper reports & high-light markers make continuous DB auditing impossible Audit process too slow to react in dynamic IT environments SecureSphere helps automate the continuous audit process Easily identify/classify DML/DDL access/changes to data Flag sensitive data access Ad-hoc grouping of objects CONFIDENTIAL - Imperva

Implement the Rules Immediate Notification Real-time Monitoring and Enforcement Identifies deviations from verified baseline Allows immediate response and/or remediation

Measure Meet Compliance Requirements

What is needed? Built in & custom reports Roll-up & drill down of data Security event analysis Compliance workflow

Regulatory Compliance Requirements History Alone Is Not Enough Reports Must Answer Two Key Questions Q: (Easy) What happened & when? A: Detailed activity history captured Q: (Hard) Was it supposed to happen? A: SecureSphere Alerting and Reporting interprets the history

Outside the business process? Data Access & Other Exceptions ADC Insight & custom templates Scheduled or on-demand Histograms, charts & tables PDF & CSV format Real-time alert monitoring Exceptions outside of expected business process Immediate triaging & response Easy integration with 3 rd -party IT ecosystems SYSLOG, SNMP, Email, Scripts CONFIDENTIAL - Imperva

Graphical Reports Pre-defined reports Custom reports Reports created on demand or emailed daily, weekly or monthly PDF and CSV (Excel) format Integration with 3 rd party reporting and SIEM tools

Compliance Reporting Thorough Analysis Capability Web and Database correlation within reports. Database Web Database Web

Compliance Reporting Thorough Analysis Capability Tracks Logins and Logouts of Database

Closing the continuous audit loop Audit Oversight Process Implement sign-off process Change management reconciliation Regression of DB & OS integrity SQL exceptions and other errors Access by role/duty within/outside business process Any new access Changes in access patterns Task-based workflow Triaging of incidents Owner, due-date, status Attach report objects to tasks Email notifications on status change CONFIDENTIAL - Imperva

Efficient Deployment and Operations No Impact to IT, Easily Managed, Low TCO

Enterprise-class coverage & scalability SecureSphere DB Audit Architecture SecureSphere GUI SecureSphere GUI Centralised object-based management with RBACs OFFLINE audit data Archive ONLINE audit data SAN SecureSphere DB Agents SecureSphere Gateways SecureSphere MX Server SPAN or TAP Flexible online/offline data retention No batched replication Distributed data query & storage Best-in-class TPS analysis for major commercial DBs SPAN, TAP or Bridge for network coverage Low impact DB Agents for local or remote DB access Direct Workstation Middleware Servers Business Applications Direct Workstation Web Servers E-Business Suite

Implement the rules What are the complete details? Exactly what happened, in detail? SecureSphere is architected for distributed processing and storage External storage is supported Scales data storage and archiving SecureSphere DMG Full Trail Views SecureSphere DMG Full Trail SecureSphere DMG Views Full Trail Databases Centralized access to data MX retrieves audit data or aggregation view in real time Scales reporting & data management External Storage Index SecureSphere MX Management Server

MSOffice1 Flexible Deployment Options Transparent Inline Bridge Data Center Supports full enforcement SecureSphere High performance, low latency Fail-open interfaces Non-inline Deployment Primarily for monitoring, zero network latency INTERNET SecureSphere Switch Reverse Non-Inline Proxy Bridge Deployment

Slide 44 MSOffice1 Find Help on how to format the other animated text - ", 1/8/2008

Unified, Scalable Management Centralized administration Manages all devices from a single console Integrated alerting and reporting Easy deployment of new appliances Browser Interface MX Management Server Appliances auto-configured by MX server Hierarchical policy management Granular role-based access control LDAP/Active Directory, Certificate Authentication SecureSphere Appliances Web browser interface

Real Time Dashboard

SecureSphere Product Line - WAF Gateway Models G4 G8/Crossbeam G16 FTL Throughput 500MB/Sec 1GB/Sec 2GB/Sec Max Transactions per Second 16,000 24,000 36,000 Recommended Web Servers 50 100 200 Form Factor Deployment mode 1U FTL Model: 2U Bridge, Router, Proxy or Monitor 1U FTL Model: 2U Bridge, Router, Proxy or Monitor 2U Bridge, Router, Proxy or Monitor Max Inline Bridge Segments 2 2 2 Max Routing Interfaces 5 5 5 Management Interfaces 1 1 1 High Availability Fail Open, IMPVHA, VRRP Fail Open, IMPVHA, VRRP Fail Open, IMPVHA, VRRP Fault Tolerance Available Available Yes

Deployment High Performance and Scalability - DxG Gateway Models G4 G8/Crossbeam APM G16 Throughput 500Mbps 1Gbps 2Gbps TPS 50,000 100,000 200,000 Max Recommended DB Servers 25 50 100 Form Factor 1U (2U for FT Model) 1U (2U for FT Model) 2U Deployment mode Non-inline/Bridge/Router Non-inline/Bridge/Router Non-inline/Bridge/Router Max Inline Bridge Segments 2 2 2 Max Routing Interfaces 5 5 5 Management Interfaces 1 1 1 High Availability Fail Open or STP/VRRP/IMPVHA Fail Open or STP/VRRP/IMPVHA Fail Open or STP/VRRP/IMPVHA Integrated Management Option Yes Yes No

Easing regulatory compliance through data governance Meet Business and Technical Needs Complete Data Governance and Protection Assess the IT environment Set Controls and Policies Monitor Activity and Enforce the Rules Measure against regulatory requirements and security policies Seamless Deployment, Unrivaled Operational Efficiency No Impact on Database Server, Applications or Network No On-going Tuning Best-in-class audit performance and ease of management Hierarchical Object Oriented management of Users, Roles, Applications CONFIDENTIAL - Imperva

Thank You Imperva, Inc. 950 Tower Lane, Suite 1550, Foster City, CA 94404 Sales: +1-866-926-4678 www.imperva.com