Database Role Activity. DB Role and Privileges Worksheet.

Slides:



Advertisements
Similar presentations
Auditing Oracle Lisa Outlaw CISA, CISSP, ITIL Foundation
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Understand Database Security Concepts
Information Security Policies and Standards
Chapter 9 Auditing Database Activities
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Administering User Security
Concepts of Database Management Seventh Edition
Secure SQL Server configuration Pat Larkin Ward Solutions
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Database Security Managing Users and Security Models.
Module 8: Implementing Administrative Templates and Audit Policy.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
11 Copyright © 2004, Oracle. All rights reserved. Oracle Database Security.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
1 IT420: Database Management and Organization Database Security 5 April 2006 Adina Crăiniceanu
Copyright © 2013 Curt Hill Database Security An Overview with some SQL.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Managing users and security Akhtar Ali. Aims Understand and manage profiles Understand and manage users Understand and manage privileges Understand and.
Roles & privileges privilege A user privilege is a right to execute a particular type of SQL statement, or a right to access another user's object. The.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
IMS 4212: Database Security 1 Dr. Lawrence West, Management Dept., University of Central Florida Data & Database Administration Security.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Controlling User Access Fresher Learning Program January, 2012.
Chapter 2 Securing Network Server and User Workstations.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 15 Database Administration and Security.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 10: Implementing Administrative Templates and Audit Policy.
Understand Audit Policies LESSON Security Fundamentals.
IST 318 Database Administration Lecture 9 Database Security.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
7 Copyright © 2007, Oracle. All rights reserved. Administering User Security.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Chapter 6 Password, Profiles, Privileges, and Roles
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Review of IT General Controls
Securing Network Servers
Chapter One: Mastering the Basics of Security
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Audit Findings: SQL Database
Limiting SQL Server Exposure
Lesson 16-Windows NT Security Issues
Information Security Awareness
Limiting SQL Server Exposure
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Database Role Activity

DB Role and Privileges Worksheet

DB Role and Privileges Answers

Remember Code Change SOD?

Database Security Configuration 1. Verify that database permissions are granted or revoked appropriately for the required level of authorization. Risk: If database permissions are not restricted properly, unauthorized access to critical data may occur.

Database Security Configuration 2. Review database permissions granted to individuals instead of groups or roles. Risk: Assigning permissions to individuals rather than roles/groups increases maintenance required for security, and greatly increases the chances of making security mistakes.

Database Security Configuration 3. Ensure that database permissions are not implicitly granted incorrectly. Risk: Poorly managed database permissions can allow access to all data and can lead to unauthorized access to data.

Database Security Configuration 4. Review dynamic SQL executed in stored procedures. Risk: If stored procedures and functions are not constructed properly, they be manipulated to gain unauthorized access to data and functionality.

Database Security Configuration 5. Ensure that row-level access to table data is implemented properly. Risk: If row-level security is not well designed, the DBA may be unable to restrict access to a subset of rows in a table.

Database Security Configuration 6. Ensure that PUBLIC permissions are revoked where not needed. Risk: Default PUBLIC permissions will most likely provide more access than is warranted than business need requires.

Oracle Access Worksheet

Oracle Access Answers

Example Oracle Output GRANTEE GRANTED_ROLE ADM DEF DBA DELETE_CATALOG_ROLE YES YES EXECUTE_CATALOG_ROLE YES YES EXP_FULL_DATABASE NO YES GATHER_SYSTEM_STATISTICS NO YES IMP_FULL_DATABASE NO YES JAVA_ADMIN NO YES JAVA_DEPLOY NO YES PLUSTRACE YES YES SELECT_CATALOG_ROLE YES YES DBSNMP CONNECT NO YES DPAUL DWREADER NO YES DSHERMAN DWREADER NO YES DWOWNER PLUSTRACE NO YES EXECUTE_CATALOG_ROLE HS_ADMIN_ROLE NO YES

Operating System Security 7. Ensure that access to the operating system is restricted to server administrators and back up operators. Risk: If users have access to the operating system, this can be used to circumvent access controls built into the database and the application(s) on top of the database.

Operating System Security 8. Ensure that permissions on the directory to which the database is installed are restricted to authorized individuals with a business need. Risk: File level access to the database can be used to circumvent access controls to database and application, to alter or corrupt the data, or to disrupt access for authorized users.

Operating System Security 9. Ensure that permissions on the registry keys used by the database are restricted to authorized individuals with a business need. Risk: Failure to secure the registry keys that are used to store configuration values that are important to the secure functioning of the database can lead to a breech of security.

Password Management 10. Check for default usernames and passwords. Risk: Failure to control default usernames and passwords is a violation of University policy, and can lead to unauthorized access, data corruption, and loss of availability.

Default Accounts and Default Password Oracle Default Passwords SYS = CHANGE_ON_INSTALL SYSTEM=MANAGER Scott = Tiger DBSNMP = DBSNMP OUTLN = OUTLN Other Locked Default Accounts

Easily Guessed Passwords 11. Check for easily guessed passwords. Risk: Using passwords that can be easily guessed can lead to unauthorized access. Password complexity is required by University policy.

Password Management 12. Check that password management capabilities are enabled. Risk: If the DBA does not configure the settings, these features will not be enabled, lowering the security of the database.

Password Management Passwords may be established remotely OS Authentication Remote Password File

University Password Policy Same password requirements for servers and applications – 8 character minimum – Periodically changed –Complexity –Failed Login Attempts –Passwords not Shared

Audit Trails & Monitoring 13. Check that auditing is enabled. Risks: Audit trails are required to: o Determine who accessed which systems o Determine what activities were performed o Identify suspicious access o Monitor for attempts to exploit vulnerabilities o Find and track deviations from baseline

Audit Trails & Monitoring –More critical in a DB setting –Often claimed to be too resource intensive

Encryption 14. Verify that network encryption is implemented. Risk: Data sent in the clear can be intercepted by unauthorized parties.

Encryption 15. Verify that encryption of data-at-rest is implemented where appropriate. Ensure that encryption key management is part of the disaster- recovery plan. Risk: Data are most likely to be stolen from the database while at rest, not while traversing the network.

Patch Management and Integrity 16. Verify that the latest patches for the database have been installed. Risk: Failure to apply security patches will leave the database vulnerable to compromise.

Patch Management and Integrity 17. Verify that the database is running a version the vendor continues to support. Risk: An unsupported version may no longer receive patches, leaving the system open to new vulnerabilities.

Patch Management and Integrity 18. Verify that policies and procedures are in place to identify when a patch is available and to apply the patch. Risk: If policies and procedures are not in place to identify when a patch is available, the DBA may be unaware of new patches.

Patch Management and Integrity 19. Evaluate what the database administration group is doing to ensure the integrity of the database, (looking for root kits, viruses, backdoors, etc). Risk: If a compromise is not detected, an unauthorized individual may maintain access for an extended period of time.

Application and Database Auditing Exercise