Auditing Data Access Without Bringing Your Database To Its Knees



Similar documents
Real-Time Database Protection and. Overview IBM Corporation

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.

Enterprise Database Security & Monitoring: Guardium Overview

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

MySQL Security: Best Practices

Best Approaches to Database Auditing: Strengths and Weaknesses.

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Making Database Security an IT Security Priority

Guide to Auditing and Logging in the Oracle E-Business Suite

Enterprise Security Solutions

SecureVue Product Brochure

<Insert Picture Here> Oracle Database Vault

McAfee Database Security. Dan Sarel, VP Database Security Products

The Comprehensive Guide to PCI Security Standards Compliance

Oracle Database Security Myths

Securing Data in Oracle Database 12c

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Database Assessment. Vulnerability Assessment Course

Configuration Audit & Control

Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls

Oracle Database Security Solutions

CorreLog Alignment to PCI Security Standards Compliance

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

Client Security Risk Assessment Questionnaire

Enforcive / Enterprise Security

An Oracle White Paper January Oracle Database Firewall

An Oracle White Paper January Oracle Database Firewall

Security and Control Issues within Relational Databases

Database Security & Auditing

Application Monitoring for SAP

Defending the Database Techniques and best practices

Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation

Privileged User Monitoring for SOX Compliance

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Installing and Configuring Guardium, ODF, and OAV

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

DATABASE AUDITING TOOLS AND STRATEGIES

Fine Grained Auditing In Oracle 10G

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

The Fundamental Difference Between SIEM & Log Management Solutions: State vs. Event Data

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Securing Oracle E-Business Suite in the Cloud

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

IT Security & Compliance. On Time. On Budget. On Demand.

Database as a Service (DaaS) Version 1.02

Why Add Data Masking to Your IBM DB2 Application Environment

<Insert Picture Here> Oracle Database Security Overview

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Oracle Audit in a Nutshell - Database Audit but how?

QRadar SIEM 6.3 Datasheet

Dynamic Data Center Compliance with Tripwire and Microsoft

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

NIST Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Enforcive /Cross-Platform Audit

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

IBM Software Top tips for securing big data environments

MySQL Security for Security Audits

Comprehensive Approach to Database Security

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

An Oracle White Paper April Oracle Audit Vault and Database Firewall

Protecting Sensitive Data Reducing Risk with Oracle Database Security

8 Steps to Holistic Database Security

Vormetric Data Security

Oracle Database 11g: Security. What you will learn:

Secure Cloud Computing

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Oracle Database 11g: Security

Vendor Questionnaire

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

All About Oracle Auditing A White Paper February 2013

Think like an MBA not a CISSP

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

New Oracle 12c Security Features Oracle E-Business Suite Perspective

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Advantages of Server-side Database Auditing. By SoftTree Technologies, Inc.

Database Monitoring and Security Solutions. Olivier Gillet

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

General DBA Best Practices

Oracle Database Security

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Transcription:

Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant

Agenda Auditing Requirements In The Regs Accessing Data in the Database Native vs. Network Data Access Auditing Live Demo Embarcadero Technologies Page: 2

Auditing Requirements In The Regs

IT Compliance Chaos Embarcadero Technologies Page: 4

Embarcadero Technologies Page: 5

What to Log CobiT (SOX) PCI DSS HIPAA CMS ARS 21 CFR Part 11 GLBA ISO 17799 NERC NIST 800-53 (FISMA) Data Access (Successful/Failed SELECTs) (I) (I) Data Changes (Insert, Update, Delete) (I) System Access (Successful/Failed Logins; User/Role/Permissions/Pswd changes) (I) (I) (I) Privileged User Activity (All) (I) (I) (I) (I) (I) System Changes (Enable/Disable Logs, Services, Configs; Reboots, Errors) (I) (I) (I) (I) (I) (I) Schema Changes (Create/Drop/Alter Tables, Columns) (I) (I) (I) (I) (I) (I) (I) Embarcadero Technologies Page: 6

CA SB1386 (+34) Data Breach Notification Law PII = Name + SSN/DL/CC/BA Number Specifies notification requirements When X days after discovery Who everyone who s data was lost Most offer exemption if data encrypted Some offer exemption if unlikely the data will be used Does NOT specify how to PREVENT a breach If you aren t monitoring data access, hard to know if there s a breach (except in the case of physical loss) Complete audit trail will give clear picture of exactly what data was taken and which customer records were affected Are you better off not knowing? If I don t know a breach occurred then I m not in violation when I don t notify anyone Willful ignorance doesn t fly with the regulators Do you really want to learn about the breach from your TV? Tens-of-thousands of customer calls you aren t prepared to handle Embarcadero Technologies Page: 7

Where is my PII? Many locations: E-mail content security Excel & Word Help! Paper physical security Databases largest concentration Scan your network! Like all other types of IT assets, you will likely be surprised by how much is out there Must handle devices (e.g. laptops) that aren t always connected to the network Must be able to tell you what applications are installed on each device Must be able to traverse network devices (bridges, routers, firewalls, etc.) Tricky part what kind of data is in those databases you didn t know about? Reverse-engineering tools will build a data model for you Have to gain access to the db first though Embarcadero Technologies Page: 8

Embarcadero Technologies Page: 9

Embarcadero Technologies Page: 10

Accessing Data in a Database

SELECT Statement Used to retrieve data from the database Typically generated by an application and removed from the business user SELECT name, address, ssn FROM cust_tbl Retrieves all records from that table SQL itself does not contain any sensitive data (so neither does the log file) SELECT WHERE acct=1231231123 FROM acct_tbl Retrieves only one record SQL statement contains account number Embarcadero Technologies Page: 12

Protecting Logs CobiT (SOX) PCI DSS HIPAA CMS ARS 21 CFR Part 11 GLBA ISO 17799 NERC NIST 800-53 (FISMA) Limit Read Access (I) (I) Separate from DBs/ DBAs Being Monitored Prevent Changes (I) (I) Sufficient Storage Capacity (I) (I) Encrypt Sensitive Data (I) Alert on Changes, Capacity, and Errors (I) (I) (I) Embarcadero Technologies Page: 13

Other Data Access/Retrieval Commands Additional methods: Stored Procedures Insert into Bulk Copy Programs Unload utilities Backup routines Replication services Proprietary APIs Watch for: Unexpected application IDs Unusual syntax Unusual source IP Embarcadero Technologies Page: 14

Review and Retention Requirements CobiT (SOX) PCI DSS HIPAA CMS ARS 21 CFR Part 11 GLBA ISO 17799 NERC NIST 800-53 (FISMA) Review Logs Regularly At least Monthly Daily At least Monthly 1-14 Days Daily On-line Retention Off-line Retention 1-7 Years 3+ Month 1+ Years 1-6 Years 90 Days 1 Year 90 Days Back-up Audit Trails To Separate Media Embarcadero Technologies Page: 15

Native vs. Network Data Access Auditing

Database Auditing Solutions Application Users Application users login to query and update underlying application data DML (Insert, Update, Delete) Enterprise Application Privileged Users (DBAs) DCL (Grant, Revoke) DDL (Create, Drop, Alter) (3) Database Auditing Corporate Data Assets Auditing DML (Insert, Update, Delete)(1) Database DBAs access and update, accounts, schemas, and data (2) Database Auditing Embarcadero Technologies Page: 17

Gaps in Native Auditing PERFORMANCE! Data access auditing can significantly slow down existing system performance affecting end-user SLAs Vulnerable to insiders DB privileged users can disable or alter logs stored on the database being monitored Insufficient visibility, control Database platforms are highly variable in audit records Complex to manage Multi-platform environments require multiple skill sets Variable platforms mean inconsistent reports No aggregation Separate logs for each db instance Embarcadero Technologies Page: 18

Comparing DBMS Data Access Logging Platform Oracle Microsoft SQL Server Sybase DB2 Informix SELECT Auditing Fine Grain Auditing (FGA) enhanced w/ 10g via SQL Server traces Sp_audit Authorization Checking (CHECKING) Read Row (RDRW) 10-30% CPU impact when enabling logging for all SELECT activity Often not granular must audit a group of activities or audit across all tables Full info such as user ID, source IP, table name not always included with the SELECT audit record (just reference numbers that must be looked up) Full audit log = stopped database Embarcadero Technologies Page: 19

Network-based Auditing Architecture Database Users Middleware Presentation Alerting Rules Network Listener Network Tap or Managed Switch Dispatcher(s) Data Router Summary Routines Alerts Audit Repository Collector Database Reader Maintenance (back up, purge) Console Reports Monitored Database Server(s) Embarcadero Technologies Page: 20

Advantages To Network-Based Approach Transparency: no changes to Apps or DBs Completeness: log everything Performance: no impact to DBMS performance Availability: logging failure will not affect DBMS Scalability: monitor hundreds to thousands of DB instances Segregation of Duties: remove audit trails from control of systems/users being audited Coverage: consolidate and analyze across instances and platforms Flexibility: tailor auditing by activity, table, user, role Embarcadero Technologies Page: 21

Live Demo!

Key Reports and Alerting Rules Large SELECT statements Failed SELECT statements Unauthorized source IP Unauthorized application ID Privileged Users Unusual SQL syntax Unusual increase in activity Audience: Others? Embarcadero Technologies Page: 23

Resources Security Benchmarks NIST SP 800-70: http://csrc.nist.gov/checklists/download_sp800-70.html CIS Configuration Benchmarks: www.cisecurity.com DISA STIG: http://iase.disa.mil/stigs/stig/ NSA: http://www.nsa.gov/snac/downloads_db.cfm?menuid=scg10.3.1.2 Vendor Guidance: Oracle: http://www.oracle.com/technology/pub/articles/nanda_fga_pt3.html MS SQL Server: http://www.microsoft.com/technet/security/prodtech/sqlserver/sql2kaud.mspx Sybase: http://manuals.sybase.com/onlinebooks/groupas/asg1251e/sag/@generic BookView/39806;td=50#X DB2: http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=/com.ibm.db2.d oc.admin/bjndmstr574.htm Informix: http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/index.jsp?topic=/com.ibm.db2.d oc.admin/bjndmstr574.htm Embarcadero Technologies Page: 24

Contacts www.embarcadero.com Kimber Spradlin kimber.spradlin@embarcadero.com 303-730-7981 x127 Dale Brocklehurst dale.brocklehurst@embarcadero.com 719-548-7400 x208 Embarcadero Technologies Page: 25