Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Security and Privacy Techniques for Modern Databases

Similar presentations


Presentation on theme: "Data Security and Privacy Techniques for Modern Databases"— Presentation transcript:

1 Data Security and Privacy Techniques for Modern Databases
Thomas LaRock, Head Geek™, SolarWinds®

2 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Why Are You Here? You have data, and databases You want to secure that data You have no idea how to get started © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

3 Thomas LaRock Head Geek, SolarWinds Over 20 years experience in roles including programmer, developer, analyst, and DBA. Enjoys working with data, probably too much to be healthy, really. thomaslarock.com/blog @SQLRockstar facebook.com/thomas.larock linkedin.com/in/SQLRockstar

4 NIST Cybersecurity Framework
Identify Detect Protect Respond Recover We are going to focus on data, and databases. Outside the scope for today’s lecture are detailed discussions on physical security, firewalls, virtual networks, etc. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

5 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

6 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

7 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

8 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

9 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

10 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Identify Data Management Risk Assessment Azure® Data Catalog Data Discovery and Classification Vulnerability Assessment Azure Data Catalog is a v1, not sure how much more work is being invested SQL Data Discovery and Classification – works on metadata, supported languages? Quick demo of SSMS and Azure Portal Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. Examples of outcome Categories within this Function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

11 © 2019 SolarWinds Worldwide, LLC. All rights reserved.

12 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Protect Data security Access control Information protection Data at rest Data in use Data in motion I think this slide would be a good bacon byte of “Data at rest become data in motion, which becomes data in use, which becomes data at rest. It’s the data circle of life.” Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology. It’s the data circle of life. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

13 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Data at Rest Database files Additional app files Database backups Transparent Data Encryption Backup Encryption Bitlocker Data is at rest when it is stored on disk, typically in files. Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

14 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Data in Use Excel® PowerBI Access control Row Level Security Dynamic Data Masking Data in use is more vulnerable than data at rest because, by definition, it must be accessible to those who need it. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

15 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Data in Motion Transmit data across network Secure Sockets Layer (SSL) Always Encrypted © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

16 © 2019 SolarWinds Worldwide, LLC. All rights reserved.

17 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Detect Timely discovery of events SQL Server® Audit SQL Injection Anomalous Access Data Exfiltration Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

18 © 2019 SolarWinds Worldwide, LLC. All rights reserved.

19 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Respond Response plan Containment Mitigation Continuous improvements Penetration testing Red Team Blue Team A security incident is analogous to a forest fire. Until the smoke clears it can be difficult to grasp the severity of an incident and the extent of damage it has caused. Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. The Respond Function supports the ability to contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

20 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Red Team/Blue Team Red Team Blue Team Assign specific task Identify vulnerabilities in the PPT (People, Processes, Technology) Review logs (SIEM) Threat intelligence Network traffic flow analysis A security incident is analogous to a forest fire. Until the smoke clears it can be difficult to grasp the severity of an incident and the extent of damage it has caused. Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. The Respond Function supports the ability to contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

21 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Recover If you can’t recover, you can’t keep your job RPO/RTO Consider how you refresh dev/test from production Don’t recover malware! Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications. © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

22 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
Agenda 1 Identify 2 Detect 3 Protect 4 Respond 5 Recover © 2019 SolarWinds Worldwide, LLC. All rights reserved.

23 © 2019 SolarWinds Worldwide, LLC. All rights reserved.

24 © 2019 SolarWinds Worldwide, LLC. All rights reserved.

25

26 © 2019 SolarWinds Worldwide, LLC. All rights reserved.
For More Information slrwinds.com/NIST-Framework slrwinds.com/DataCatalog slrwinds.com/DataDiscoveryClassification slrwinds.com/VulnerabilityAssessment slrwinds.com/TDE slrwinds.com/BackupEncryption slrwinds.com/RLS slrwinds.com/DDM slrwinds.com/AlwaysEncrypted slrwinds.com/SQLAudit slrwnds.com/SQL-ThreatDetect slrwinds.com/SQLMAP © 2019 SolarWinds Worldwide, LLC.  All rights reserved.

27


Download ppt "Data Security and Privacy Techniques for Modern Databases"

Similar presentations


Ads by Google