WHITEPAPER. Compliance: what it means for databases



Similar documents
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

igrc: Intelligent Governance, Risk, and Compliance White Paper

Making Money With Kaseya

WHITEPAPER. Improving database development

Using Data Loss Prevention for Financial Institutions Banks, Credit Unions, Payments

Governance, Risk, and Compliance (GRC) White Paper

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Compliance and Industry Regulations

IT Security & Compliance Risk Assessment Capabilities

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

The SQL Injection Threat Study

Making Compliance Work for You

SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS

Database Auditing and Compliance in a Mainframe Environment. Craig S. Mullins, Corporate Technologist, NEON Enterprise Software, Inc.

Improving database development. Recommendations for solving development problems using Red Gate tools

How To Write A Cloud Security Framework

Practical Guidance for Auditing IT General Controls. September 2, 2009

Feature. Log Management: A Pragmatic Approach to PCI DSS

Security Controls What Works. Southside Virginia Community College: Security Awareness

Design of Database Security Policy In Enterprise Systems

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Whitepaper: 7 Steps to Developing a Cloud Security Plan

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Why Encryption is Essential to the Safety of Your Business

Self-Service SOX Auditing With S3 Control

AlienVault for Regulatory Compliance

Managing risks in a Salesforce environment

IT Security & Compliance. On Time. On Budget. On Demand.

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

MySQL Security: Best Practices

How To Implement Data Loss Prevention

Enterprise Computing Solutions

Compliance, Audits and Fire Drills: In the Way of Real Security?

Secure Mobile Shredding and. Solutions

White Paper. Managing Risk to Sensitive Data with SecureSphere

Regulatory Compliance and Least Privilege Security

Enabling Compliance Requirements using ISMS Framework (ISO27001)

Contingency Plan for HIPAA

Encryption Key Management for Microsoft SQL Server 2008/2014

Secure and control how your business shares files using Hightail

Access at the Rack Level in Your

Vulnerability. Management

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

McAfee Database Security. Dan Sarel, VP Database Security Products

The Business Case for Security Information Management

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Compliance Management, made easy

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

ESET Secure Authentication

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

The Value of Vulnerability Management*

XBRL & GRC Future opportunities?

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Tame the Network and Security Challenges of a Data Center Migration

The Education Fellowship Finance Centralisation IT Security Strategy

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Making Database Security an IT Security Priority

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Achieving Business Imperatives through IT Governance and Risk

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

PROTEUS Enterprise - IT Governance, Risk and Compliance Management Solution

Information Security Plan May 24, 2011

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Cyber, Security and Privacy Questionnaire

Real-Time Database Protection and. Overview IBM Corporation

Rowan University Data Governance Policy

Transcription:

WHITEPAPER Compliance: what it means for databases

Introduction Compliance is the general term used to describe the efforts made by many (typically larger) organizations to meet regulatory standards. In the US, the most important compliance regulation is the Sarbanes Oxley Act of 2002 (SOX) for public companies and the Statement on Auditing Standards No. 70: Service Organizations (SAS70) for private organizations. Other compliance regulations include: The Health Insurance Portability and Accountability Act (HIPAA) The PCI Data Security Standard (PCI DSS) The Gramm Leach Bliley Act (GLB) The Federal Information Security Management Act of 2002 (FISMA) The International Organization for Standardization (ISO) standard ISO17799 In the UK, the Financial Services Authority (FSA) also maintains regulatory requirements The majority of this legislation deals with increasing accountability in the wake of some highly visible and damaging breaches of public trust. It gives rise to a need for more reliable paper trails, security and access controls, detailed and reliable monitoring, and change histories. 2

The impact on database professionals Regulatory compliance has an impact throughout an organization, from finance departments and CIOs to individual developers and database administrators (DBAs). For example, compliance auditors will require DBAs - the custodians of a company's critical data - to account for all changes to a database, and detail all those with access to it. This means they must be able to demonstrate that they have processes in place to: Manage how schema and data changes are made Document the changes that are made Maintain a detailed history of who made which changes Document database schema and access permissions Revert to previous versions if problems occur Unfortunately, these are areas where database development has long lagged behind wider application development. The nature of database code has historically been seen as a barrier to the implementation of change management, and therefore the maintenance of an audit trail. Many databases even go into production without any clear and meaningful history of changes, and auditors may regard this as an unacceptable avenue of risk. 3

An audit trail for SQL Development Introducing source control to the development process lets you know who changed what, when, and why. It is therefore the first step in getting databases ready for compliance. SQL Source Control integrates with existing source control systems, and SQL Server Management Studio; so there is no need to change the way you work. This eases adoption, giving you a database development audit trail with minimal disruption. 4

Preparing for compliance with the SQL Developer Bundle Compliance requires strict process enforcement and information management. Although no single tool can solve an organization's compliance problems in their entirety, the SQL Developer Bundle presents a package of solutions to some of the most painful and costly database development and deployment problems. Undocumented code and poor change tracking expose you to risk, and the tools in the SQL Developer Bundle seek to mitigate that risk with minimal overheads. To give a simple example: it is compliance best practice to document changes to schemas and application data. SQL Source Control allows you to preserve an incremental history of these changes, who they were made by, why and when. SQL Compare and SQL Data Compare can not only deploy these changes, but produce detailed reports of the differences between databases, and the final changes you deploy. In addition, SQL Doc produces thorough schema documentation, and SQL Data Generator allows you to test databases with realistic data in cases where sensitive production data cannot be used. This means you can begin to form a database audit trail with minimal extra investment and disruption. You can download the SQL Developer Bundle, with all the tools described in this paper, for a free 14 day trial here: www.red-gate.com/sql-developer-bundle 5