managing the entire database security & compliance lifecycle · pdf filemanaging the...

15
© 2009 IBM Corporation Managing the Entire Database Security & Compliance Lifecycle Daniel Ling IBM SWG HK

Upload: duongcong

Post on 11-Mar-2018

232 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM Corporation

Managing the Entire Database Security & Compliance Lifecycle

Daniel LingIBM SWG HK

Page 2: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Today’s Top Data Protection Challenges

Where is my sensitive data Where is my sensitive data -- and whoand who’’s s accessing it (including privileged users)?accessing it (including privileged users)?

How can I enforce access control & How can I enforce access control & change control policies for databases?change control policies for databases?

How do I check for vulnerabilities andHow do I check for vulnerabilities and locklock--down database configurations?down database configurations?

How do I reduce costs by automating & How do I reduce costs by automating & centralizing compliance controls?centralizing compliance controls?

Page 3: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Database Servers = Vast Majority of Compromised Records

“Although much angst and security funding is given to offline data,

mobile devices, and end-user systems, these assets are simply

not a major point of compromise.”

Online data = 99.9% of all compromised records

http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf

2009 Data Breach Report from Verizon Business RISK Team

Page 4: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Database Monitoring: 3 Key Business Drivers

1. Internal threatsIdentify unauthorized changes (governance)Prevent data leakage

2. External threatsPrevent theft

3. ComplianceSimplify processesReduce costs

Page 5: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Common Security Technologies are InsufficientPerimeter defenses, IDS/IPS, WAF, etc.

• Lack awareness of database-specific policies & protocols• Doesn’t protect against internal threats

Traditional Data Loss Prevention (DLP)• Catches sensitive data as it leaves via email or USB• Can’t stop data theft at the source – in the data center• Lacks database-focused monitoring, analytics & blocking• No knowledge about DBMS commands, vulnerabilities & structures

Database encryption – doesn’t protect against• Hackers who hijack Web/application servers• Rogue administrators with access to encryption keys

Security Information & Event Management (SIEM) • Rely on imported DBMS log data• No real-time monitoring at data level to detect unauthorized access• Lack database-focused analytics & blocking

Native Database Auditing/Logging• Requires Database Changes• Impacts Performance

Page 6: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Database Activity Monitoring for Security-- Protect your critical data assets – inside your firewall-- Protect your brand and customer loyalty-- Trust - but verify privileged user activity-- Ensure compliance

- Privileged User Activity - Sensitive Objects Access- Comprehensive Auditing

Critical data assets of your

company

Page 7: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

IBM acquired Guardium - 30 Nov 2009

Page 8: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Leading Vendor in Forrester Wave for Enterprise Database Auditing and Real-Time ProtectionsGuardium Overall #1

“Dominance in this space.”“A Leader across the board.”“Leadership in supporting large heterogeneous environments, high performance and scalability, simplifying administration and real-time database protection."Guardium offers “extremely good compliance reporting and role separation capabilities” = Separation of Duties#1 score for Architecture along with perfect scores:

– Performance– Scalability– Usability– Levels of Auditing;– Monitoring & Notification (real-time alerting);– Application Level Support (pooled connection end user ID’s)

Page 9: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Addresses the Full Database Protection Lifecycle

Critical Data

Infrastructure

Audit&

Report

Assess&

Harden

Discover&

Classify

Monitor &

Enforce

Page 10: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Real-Time Database Monitoring

• Non-invasive architectureOutside databaseMinimal performance impact (2-3%)No DBMS or application changes

• Enforces separation of duties• Cross-DBMS solution• 100% visibility-Network SQL and Local DBA

access (Bequeath, Shared Memory, Named Pipes, etc.)

• Does not rely on DBMS-resident logs that can easily be erased by attackers, rogue insiders

• Granular, real-time policies & auditingWho, what, when, how

• Automated compliance reporting, sign-offs & escalations (SOX, PCI, HIPAA, NIST, etc.)

• Real-time Alerting

DB2

Host Based Probes (S-TAP) Secure Appliance(s)

Collectors forAudit Data/Repository

Page 11: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Scalable Multi-Tier Architecture

Integration with LDAP, IAM, IBM Tivoli SIEM, IBM TSM, Remedy, …

IIIIII

Page 12: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Client IPClient host nameDomain loginOS user nameDB user nameClient OSMACTTLOriginFailed loginsEtc.

Server IPServer portServer nameSessionSQL patternsNetwork protocol(TCP)Server OSTimestampSource programsApp user nameEtc.

ALL SQLColumns/FieldsTables/ObjectsVerbs:DDLDCLDMLSELECTsDB user nameDB versionDB typeDB protocolDB errors

Privileged Users

Client IPClient host nameDomain loginOS user nameDB user nameClient OSSource ProgramMACTTLOriginFailed loginsLocal Protocol(Bequeath, Shared Memory, Named Pipes, TLI, IPC)Etc.

All SQL traffic contextually analyzed & filtered in real-time - to provide specific information required by auditors - without native logging!• To address “who, what, when, where and how”

Page 13: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Guardium Safeguards McAfee.com• Who: World’s Largest Dedicated Security Company• Need: Safeguard millions of PCI transactions

– Maintain strict SLAs with ISP customers (e.g., Comcast, COX Communications)

– Automate PCI controls

• Environment: Guardium deployed in less than 48 hours– Multiple data centers; clustered databases– Integrated with ArcSight SIEM– Expanding coverage to SAP systems for SOX

• Previous Solution: Central database audit repository with native DBMS logs– Massive data volumes; performance & reliability issues; SOD issues

• Results:– “McAfee needed a solution with continuous real-time visibility into all sensitive cardholder data – in order to

quickly spot unauthorized activity and comply with PCI-DSS – but given our significant transaction volumes, performance and reliability considerations were crucial.”

– “We were initially using a database auditing solution that collected information from native DBMS logs and stored it in an audit repository, but granular logging significantly impacted our database servers and the audit repository was simply unable to handle the massive transaction volume generated by our McAfee.com environment.”

– “The Guardium solution provided enterprise-class scalability in a solution and was deployed in less than 48 hours. In addition to safeguarding our customers’ trust, Guardium’s technology also automates our PCI database controls and reduces DBA workload while enforcing separation of duties to protect against both internal and external threats.” (Tony Gunn, director of security engineering, McAfee)

Page 14: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM CorporationConfidential

Simplifying Enterprise Security for Dell

• Need:– Improve database security for SOX, PCI & SAS70– Simplify & automate compliance controls

• Guardium Deployment:– Phase 1: Deployed to 300 DB servers in 10 data centers

(in 12 weeks)– Phase 2: Deployed to additional 725 database servers

• Environment :– Oracle & SQL Server on Windows, Linux; Oracle RAC, SQL Server clusters– Oracle EBS, JDE, Hyperion plus in-house applications

• Previous Solution: Native logging (MS) or auditing (Oracle) with in-house scripts– Supportability issues; DBA time required; massive data volumes; SOD issues.

• Results: Automated compliance reporting; real-time alerting; centralized cross-DBMS policies; closed-loop change control with Remedy integration– Guardium “successfully met Dell’s requirements without causing outages to any databases;

produced a significant reduction in auditing overhead in databases.”

Published case study in Dell Power Solutions

Page 15: Managing the Entire Database Security & Compliance Lifecycle · PDF fileManaging the Entire Database Security & Compliance Lifecycle Daniel Ling ... 100% visibility-Network SQL and

© 2009 IBM Corporation