AN EXTENSIBLE FRAMEWORK FOR DATABASE SECURITY ASSESSMENT AND VISUALIZATION



Similar documents
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Client Overview. Engagement Situation. Key Requirements

Achieving Database Compliance with Sarbanes-Oxley Using Sentrigo Hedgehog

BUILDING OLAP TOOLS OVER LARGE DATABASES

White Paper. Managing Risk to Sensitive Data with SecureSphere

EMC Smarts Network Configuration Manager

Certified Information Systems Auditor (CISA)

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009

MS Enterprise Library 5.0 (Logging Application Block)

GCE APPLIED ICT A2 COURSEWORK TIPS

Implementing Database Security and Auditing

The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform

MySQL Security: Best Practices

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

AlienVault for Regulatory Compliance

An Oracle White Paper February Rapid Bottleneck Identification - A Better Way to do Load Testing

CHAPTER 1 INTRODUCTION

Paper Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Project Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching

Real-Time Database Protection and. Overview IBM Corporation

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

<Insert Picture Here> Oracle Database Security Overview

Optimal Planning Software Platform Development with Cloud Computing Technology

Enforcive / Enterprise Security

GFI White Paper PCI-DSS compliance and GFI Software products

McAfee Web Reporter Turning volumes of data into actionable intelligence

Managing Special Authorities. for PCI Compliance. on the. System i

8070.S000 Application Security

TSM Studio Server User Guide

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

An Oracle White Paper June Security and the Oracle Database Cloud Service

Implementing Network Monitoring Tools

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

D50323GC20 Oracle Database 11g: Security Release 2

System to System Interface Guide

Making Compliance Work for You

Netop Remote Control Security Server

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Educational Requirement Analysis for Information Security Professionals in Korea

What Should IS Majors Know About Regulatory Compliance?

What s New in Centrify Server Suite 2013 Update 2

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

8 Steps to Holistic Database Security

Online Lead Generation: Data Security Best Practices

HIPAA Security COMPLIANCE Checklist For Employers

Perceptive Content Security

Using Assurance Models in IT Audit Engagements

COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)

The Requirements Compliance Matrix columns are defined as follows:

CARRIOTS TECHNICAL PRESENTATION

Backup and Recovery in Laserfiche 8. White Paper

Oracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles

Controlling and Managing Security with Performance Tools

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Database Security Guide

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Chapter 23. Database Security. Security Issues. Database Security

REQUIREMENTS SPECIFICATION AND MANAGEMENT. Requirements Analysis and Specification

How to Improve Database Connectivity With the Data Tools Platform. John Graham (Sybase Data Tooling) Brian Payton (IBM Information Management)

LSE PCI-DSS Cardholder Data Environments Information Security Policy

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

Electronic Document and Record Compliance for the Life Sciences

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

HealthCare Management system

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Quality Management. Lecture 12 Software quality management

White Paper. Enhancing Website Security with Algorithm Agility

FREQUENTLY ASKED QUESTIONS

Audit Logging. Overall Goals

Bitrix Intranet Portal. Business Process Guide

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Defense In-Depth to Achieve Unbreakable Database Security

Securing SharePoint 101. Rob Rachwald Imperva

enicq 5 System Administrator s Guide

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Netwrix Auditor for Windows Server

Transcription:

AN EXTENSIBLE FRAMEWORK FOR DATABASE SECURITY ASSESSMENT AND VISUALIZATION Tran Khanh Dang 1 ), Thieu Hoa Le 2 ), Duy Tin Truong 3 ) Abstract By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization and assessment method assists the administrators in holding a panoramic view of security over the database system as well as the detailed activity of each DBMS in the system. The present trend shows that it is obviously a new potential branch and this paper will introduce an extensible framework to build flexible database security measuring systems. The proposed framework allows metrics processing cores to be written in different programming languages and reside in various places of the system, the final result to be displayed on a variety of user-predefined reports and graphs, and it also provides a holistic view of accesses to the whole database systems. 1. Introduction The need for database security arising from the explosion of Web applications such as e-commerce, online-banking, etc. has been growing ceaselessly. The fact that core enterprise databases, the most valuable information assets of most enterprises, have been kept relatively safe for many years has now completely changed when the attackers realize they have a broad, accessible and available pipe through such applications into the databases. As a result, companies are urged to spend more budgets on improving database security mechanism by purchasing the newly-devised database protection products or by training the DBAs more advancedly. Unfortunately, those do not provide the final answer for the companies on their way seeking the safest shelter for their databases. The security managers instantly feel nervous when the board of directors ask them Are we more secure today than we were before? or How do we compare to our peers in this domain?. It is generally agreed that "You cannot control what you cannot measure and "To measure is to know" [2]. The answer to those questions might only be obtained if there is some system able to evaluate the security level of the running system and present the assessment clearly, concisely and, most importantly, visually to the administrators or the directors. Currently, there are some security products available on the market such as Guardium [5], SecureSphere [6], etc. and they do support in measuring the security level of a database management system (DBMS) within their specific standards. However they require the running system to be equipped with expensive specialized hardwares in order to operate properly. In this paper, we introduce a general extensible framework useful for implementing such a system but in the way as cheap as possible and using no specialized hardwares but the performance still remains reasonable and acceptable. That framework combines: 1,2,3 Faculty of Computer Science & Engineering, HCMC University of Technology, National University of Ho Chi Minh City, Vietnam, dtkhanh@hcmut.edu.vn

Database security visualization and assessment. Controlling and measuring simultaneously the security of many different DBMSs. Data auditing and analyzing. Flexibly configuring database security metrics. Complying with laws, namely data privacy acts and regulations such as SOX (Sarbanes-Oxley) [7], PCI (Payment Card Industry) [8], etc. The rest of this paper is organized as follows: Section 2 presents our proposed framework at both logical and physical layers and how the materialized system which is built on this framework will work. Section 3 elaborates on the most noticeable traits of the framework. In section 4, we discuss key points as building a system prototype with Oracle DBMS. Finally, section 5 presents concluding remarks and the future work. 2. Basic Functional Principle The framework will be discussed in more details later, but first of all, let s look at the operational principle of this-framework-based system. The system collects all necessary working information of various DBMSs from their log files, reports, etc., it then calculates the final score based on the set of database security metrics, and displays it to the user. Both the DBMSs and metrics set are identified and configured by the user beforehand. The final score is comprised of the metrics subscores. Each subscore will be multiplied by a predefined metric coefficient before being added up to the final score. The subscore, in turn, is a sum of values obtained when running its metric on the DBMSs alternately. Thus, if there are five DBMSs in figure 1, then the subscore of each metric will be the sum of five different values evaluated by multiplying the mark when performing that metric on each DBMS and the predefined DBMS s coefficient alternately. Fig. 1. Evaluate the risky level of many DBMSs When the user receives the fairly low final score which means his running system is not secured enough, he might want to find out which metric component contributes greatly to lessen the final score and hence would envisage what problem is happening. And if he is not satisfied, he will delve into that problematic metric to see which DBMS being in dangerous situation.the database security measuring system, in short, functions as a balance, putting a running system on one dish and scores on the other dish. The higher the score is, the more secure the running system is. 2.1. Logical Model There are four layers in figure 2, but the framework logically consists of only three upper layers. Raw data about DBMS activities are collected and confined gradually to yield the final score at the visualization module. Note that there is a Laws component in three upper layers, when laws compliance is enforced this component will ensure that the data transmitted through it to the upper layer will conform to the required laws. Figure 3 show three upper layers in more detail.

Fig. 2. Logical Model Fig. 3. Three upper layers in detail VISUALIZATION layer: interacts with users, receives user requests and selects suitable presentation to show the final score. Uuser utilizes Metrics Adapter to add, delete or edit metrics. Through User Request, user chooses which metrics to achieve his target of analyzing his current database environment. DB Security Evaluator then sends this request to Metric Parser to start processing and return the calculating result when completing and the former will show the final result in graphs or reports using Report-Graph Builder, to the user depends on his privilege and role identified by the laws. METRICS layer: performs user request passed from visualization layer and returns metrics calculation result to visualization layer. Metrics Parser receives user request from DB Security Evaluator and has Formatter got all the necessary data conforming to laws if required and starts performing the metrics calculation with metrics from Metrics Set and finally sends the result back to DB Security Evaluator. AUDITING layer: communicates with DBMS layer gets their raw data, refines and sends them to Metrics layer to carry out metrics calculation. The Logger will communicate with DBMSs to acquire the raw data which might have to go through Laws to ensure law compliance. When the raw data reaches Analyzer, it is refined and handed over to Formatter to reformat in some standards for Metrics layer to use later. DBMS layer is where the DBMSs reside. 2.2. Physical Model Seven main steps shown in figure 6 are explained thoroughly as follows. Each explanation is indexed corresponding to each step. (1) The user logs into the DB security measuring system, his identity as well as his role and privilege is verified by the system. When logging in successfully, he might use his privilege to add, delete or edit the metrics definition through a Metrics Adapter form (2) because the system s default metrics do not always satisfy user requests. Alternatively, the user enters his requests using a User Request form (3) and has the system sent his request to DB Security Evaluator module (4). This module, in turn, hands this request over to Metrics Parser(5) which will put all the coming requests into the Request Pool and process them in order of their priorities, in case it is busy performing some user request. To process one user request, Metrics Parser will first parse the request, identify the chosen metrics, the coefficient of each metric and each DBMS, the type of graph (pie chart, bar chart), the format of report, etc. On finishes parsing, it

will call Metrics Controller to get all the processing cores(*.dll files, web services) of those metrics. After that, it will fetch the metrics input data from Auditing Database and assure the data s laws compliance property if enforced. If such data are not available, it will have the Logger fetched them from the DBMSs (6). When all the data are ready, it will order the processing cores to perform calculating metrics and transmit the result back to the DB Security Evaluator and simultaneously save that result together with the user request in Request and Result database if he requires. This module then call Visualization module to show the final score to the user, based on his privilege and role, in the required type of graph and report (7). Note that depend on the system efficiency requirement in practice, Metrics Controller and Metrics Parser can be implemented in form of web services or modules. There might be one last question where should all these physical components reside? Our suggestion is to implement the following components: Metrics Adapter, Login, User Request, DB Security Evaluator, Visualization on the client side whilst putting Metrics Controller, Metrics Parser as well as all the database mentioned so far in one centralized server, also setting Logger, Analyzer, Formatter on the DBMSs side. 3. Prominent Features 3.1. Metrics Fig. 4 Physical Model According to Oxford s American Dictionary, a metric simply is a system or standard of measurement. Thus, it is accepted that security metrics are those measuring security or particularly how well security services are in the information system and database security metrics would be the security metrics applied in database area. Metric is the heart of the framework. From metrics comes the name database security measuring system. Without metrics, the system is defunct or no longer able to measure the security level of database environment. Detailed discussion about metrics is beyond this paper s cope. For any further metrics information, we recommend some literatures at the end of this paper. Now we will exemplify database security metric (DbSecMetric) with the metric SELECT statements for privacy sets. Privacy sets are collections of data values together forming an important privacy perspective. For example, a person s last name is not confidential, but it together with that person s driving license number and social security number is confidential. To use this metric, we must classify what kinds of data are crucial and define the corresponding privacy sets, then we calculate S - the overall number of users SELECT accesses to these privacy sets, based on the audit trails of SELECT statement and count N - the total number of database user. Let A and F be the the average frequency and final result.

A=S/N ; F = (Max(A, threshold) - threshold)/a Threshold might be set by the administrator s experience to imply all the acceptable frequencies falls below it. If the final result is close to 1, it indicates that the access frequency to sensitive data exceeds the frequency threshold unusually. The administrators, therefore, might consider putting effort to investigate further or take immediate preventive actions. It is not trivial to create a DbSecMetric that can truly reflect the present database state and risk level. DbSecMetric is still in its early stage and extensive research into this new area is really encouraged. Only after a long time testing the metrics on some practical DBMSs, can we assess their efficiency and effectiveness. 3.2. Metrics Parser The content of metrics is saved into the database using a script language. Users can create new metrics by programming with this script language. To perform metrics calculation, there needs a metrics parser which can parse the metric content to get all the essential data such as the input, output data type, where the metric processing cores are stored, etc. Besides, Metrics Parser is not directly in charge of calculating but it will call web services or.dll libraries at run time, so the metric processing cores may be written in many different programming languages and stored in many places (on web servers if they are web services). Thus, users are free to write complicated metric algorithms as well as take advantages of other system s power of calculating. Actually, this parser parses not only metric content but also user requests to get the required metrics. However the later s percentage is very small compared to the former s, hence the name Metrics Parser. 3.3. Visualization The system presents the final score in the most visual way, using many graphs and reports. There would be lots of types of graph such as pie chart, bar chart, line chart, etc. and lots of types of reports such as daily report, weekly report, monthly report or quarterly report and so on. The final result could also be compared with other results in a period of time if the user required as long as there are such results available in the database. 4. A System Prototype with Oracle We now present a system prototype based on such framework, and built with Oracle DBMS as an example. On Oracle side, three modules are set up. Logger communicates with Oracle to achieve log files saved by using Oracle's auditing function. Analyzer next refines those log files, taking only necessary data fields out for Metrics Core to calculate metrics. Formatter reforms data to meet XML standard, compresses and encrypts to improve the efficiency, and finally utilizes socket to transmit data to Auditing Database for later use. On the client side, five components are installed. Metrics Adapter, Login and User Request are user interactive forms, DB Security Evaluator a module and Visualization a graphical library containing many dll files. DB Security Evaluator receives user request and calls Metrics Parser to process it and Visualization library to show the final score. The library is updated automatically via network by regularly downloading dll files. Lastly, Metrics Controller and Metrics Parser are web applications set up on the same centralized server. So are all the database in figure 6. Metrics Controller receives metrics information from Metrics Adapter by webservices while Metrics Parser listens to DB Security Evaluator and gets its user request to perform. Additionally, Laws Compliance is dll files, called by Logger, Metrics Parser and DB Security Evaluator when needed. These files can also be updated via network.

Metrics Core is implemented as dll files on server side or web services on other computers. We are currently implementing and conducting performance evaluations of the system. 5. Conclusion and Future Work In this paper, we have introduced an extensible framework for developing a database security visually-measuring system. We started with presenting the basic functional principles of such framework then we showed the framework s tractability through the logical and physical models. Finally, we gave a system prototype with Oracle DBMS. The framework provides a practical way to build an extensible system which can evaluate simultaneously the risky levels of many different DBMSs visually through various graphs (line chart, bar char, pie chart) and flexible reports. In the future, we will take further research into solving some remaining problems: data explosion on centralized server, the impacts on DBMS s performance after installing logging components, secure and effective data transmission through compressing and encrypting. We will also add some more commonly-used metric templates to meet users demand in adapting or coordinating these templates to make a new desired metrics. References [1] T.H. Le, D.T. Truong: Database Security Visualization & Assessment, Graduation Thesis, CSE/HCMUT, 2007, (to appear). [2] A. Jaquith: Security Metrics: Replacing Fear, Uncertainty and Doubt, ISBN: 0321349989, Addison-Wesley Professional, 2007. [3] R.B. Natan: Implementing Database Security and Auditing, ISBN: 1555583342, Digital Press, 2005. [4] J.J. Champlain: Auditing Information Systems, 2 nd Edition, ISBN: 0471281174, John Wiley & Sons, 2003. [5] Guardium web: http://www.guardium.com. [6] Securesphere product: http://www.imperva.com/products/securesphere. [7] Sarbanes Oxley Law: http://www.sarbanes-oxley.com. [8] PCI Security Standards Council, http://www.pcisecuritystandards.org. [9] Community website for security practitioners: http://www.securitymetrics.org. [10] D. Litchfield: The Database Hacker's Handbook: Defending Database Servers, ISBN: 0764578014, John Wiley & Sons, 2005. [11] J.B.D. Cleman: Jeremy FairCloth. Security Log Management, ISBN: 1597490423, Andrew Williams, 2006. [12] L.M. Olivia: Information Technology Security: Advice from Expert, ISBN: 1591402476, Idea Group, 2004. [13] M.Bishop: Introduction to Computer Security, ISBN: 0321247442, Prentice Hall PTR, 2004. [14] C. Lahti, S. Lanza, R. Peterson: Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools., ISBN-10: 1597490369, Syngress, 2005. [15] D. Knox: Effective Oracle Database 10g Security by Design, ISBN-10: 0072231300, McGraw-Hill Osborne Media, 2004.