SlideShare une entreprise Scribd logo
1  sur  19
Database Administration:
The Complete Guide to Practices and Procedures
Chapter 15
Regulatory Compliance and Database
Administration
SOX: Sarbanes-Oxley Act
• The U.S. Public Accounting Reform and Investor Protection Act
of 2002 (aka Sarbanes-Oxley or simply, SOX)
– “…to use the full authority of the government to expose corruption,
punish wrongdoers, and defend the rights & interests of American
workers & investors.”
– The primary objectives of SOX:
• To strengthen and restore public confidence in corporate accountability and
the accounting profession;
• To strengthen enforcement of the federal securities laws;
• To improve executive responsibility;
• To improve disclosure and financial reporting; and
• To improve the performance of “gatekeepers.”
– Section 404 is the largest driver of SOX projects
• It is the most important section for IT because the processes and internal
controls are implemented primarily in IT systems;
• …and much of the data is stored in a DBMS.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
FISMA:
Federal Information Security Mgmt. Act
• The E-Government Act was passed in 2002 as
a response to terrorist threats
– Title III of the act is named the Federal
Information Security Management Act (FISMA).
– FISMA basically states that federal agencies,
contractors, and any entity that supports them,
must maintain security commensurate with
potential risk.
– Officials are graded on the potential effect a
security breach would have on their operations.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Other Regulations & Issues?
• And, there are more regulations to consider, for
example:
– the USA Patriot Act
– Can SPAM Act of 2003
– Telecommunications Act of 1996
– The Data Quality Act
• Additional regulations may be imposed on your
partiuclar company or applications depending
upon your industry, location, etc.
• And do not forget that new regulations will
continue to be written by government/industry
and imposed over time…
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Management Visibility
• Impact: upper-level management is keenly aware of the
need to comply, if not all of the details that involves.
• Prosecution: being successfully prosecuted (see next
slide) can result in huge fines and even imprisonment.
• Cost: cost of complete compliance can be significant, but
so can the cost of non-compliance. No longer easier just
to ignore problems.
• Durability: although there have been discussions about
scaling back some laws (e.g. SOX), increasing regulations
and therefore increasing time, effort, and capital will be
spent on compliance.
– That is, the issue will not just disappear if you ignore it long
enough!
• But, at the end of the day, ensuring exact compliance can
be a gray area.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
The DBA and Regulatory Compliance
Compliance-related tasks that impact database
administration include:
• Metadata Management and Data Quality
• Database and Data Access Auditing
• Data Masking and Obfuscation
• Long-Term Data Retention and Database
Archiving
• Closer Tracking of Traditional DBA Tasks
– (e.g. Change Management, Backup & Recovery)
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Data Quality
• Poor data quality costs the typical company at
least ten percent (10%) of revenue; twenty
percent (20%) is probably a better estimate.”
Source: Thomas C. Redman, “Data: An Unfolding Quality Disaster”,
DMReview Magazine, August 2004
Valid &
Accurate?
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Database Auditing and
Data Access Tracking
• Organizations today have to go well beyond
just securing their data.
• Companies have to perpetually monitor their
systems in order to know who did exactly
what, when and how -- to their data.
• This can be accomplished with database
auditing software
– Also known as Data Access Tracking and Data
Activity Monitoring
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
How to Audit Database Access?
There are five techniques that can be used to
audit database access:
1. Adding columns to tables
2. DBMS traces
3. Log based
4. Network sniffing
5. Capture requests at the serverThis document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Limitations of Database Audit Traces
Typically, the audit trace doesn’t record everything:
– Auditing takes place only when the audit trace is on.
– The trace does not record old data after it is changed (the log records
old data).
– If an agent or transaction accesses a table more than once in a single
unit of recovery, the audit trace records only the first access.
– The audit trace does not record accesses if you do not start the audit
trace for the appropriate class of events.
– The audit trace does not audit some utilities. The trace audits the
first access of a table with the LOAD utility, but it does not audit
access by the COPY, RECOVER, and REPAIR utilities. The audit trace
does not audit access by stand-alone utilities, such as DSN1CHKR and
DSN1PRNT.
– The trace audits only the tables that you specifically choose to audit.
– You cannot audit access
Internal DBMS audit traces drain performance
– Starting traces can “dim the lights”
– DBAs don’t like them
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Auditing Has to be at the Server Level
• If you are not capturing all pertinent access
requests at the server level, nefarious users
can sneak in and not be caught.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Should Be Able to Answer
These Questions
• Who accessed the data?
• At what date and time was the access?
• What program or client software was used to access
the data?
• From what location was the request issued?
• What SQL was issued to access the data?
• Was the request successful; and if so, how many rows
of data were retrieved?
• If the request was a modification, what data was
changed?
– A before and after image of the change should be
accessible
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Data Masking and Obfuscation
Data masking is the process of protecting sensitive and personally
identifiable information (PII) in non-production databases from
inappropriate visibility.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Data Masking Techniques
• The substitution technique replaces existing data with random values from
a pre-prepared data set.
• The shuffling technique uses the existing data and moves the values
between rows in such a way that the no values are present in their original
rows.
• The number and date variance technique varies the existing values in a
specified range in order to obfuscate them. For example, birth date values
could be changed within a range of plus or minus 90 days.
• The encryption technique scrambles the data algorithmically. This
technique will not produce realistic looking data and can make the data
larger.
• The nulling out technique simply removes the sensitive data by deleting it.
• The table-to-table synchronization technique masks data assuring that the
results are referentially intact.
– If two tables contain columns with the same data values and those columns
are masked in one table then the second table is updated with the changed
value, too.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Data Retention Drives Archiving
• Data Retention Requirements refer to the length
of time you need to keep data
– Determined by laws – regulatory compliance
• More than 150 state and federal laws
• Dramatically increasing retention periods for corporate data
– Determined by business needs
• Reduce operational costs
– Large volumes of data interfere with operations: performance,
backup/recovery, etc.
• Isolate content from changes
– Protect archived data from
modification
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
The Scope of Archiving
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
Closer Tracking of Traditional
DBA Tasks
• Regulatory compliance also can help to
improve the focus on traditional DBA
procedures and processes.
• The accounting and regulatory demands of
the regulations often require DBA practices to
be strengthened and formalized.
– Change management
– Database backup and recovery.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
What is COBIT?
• COBIT is a framework of IT best practices that companies can use to
improve management over their IT organizations, to improve the
value of IT, and to ensure that the goals of the IT organization are
aligned with the goals of the business.
– The current COBIT guidelines are available from the IT Governance
Institute
• ISACA (the Information Systems Audit and Control Association)
• Following COBIT accomplishes the following:
– Links IT and business goals
– Identifies responsibilities of business and IT owners
– monitors performance, evaluating it against metrics and maturity
models.
• The COBIT framework consists of 34 specific control objectives,
organized into 4 domains.
• Best practice frameworks like COBIT are vital tools for ensuring
compliance with regulations such as Sarbanes-Oxley (SOX).
http://www.isaca.org/Knowledge-Center/cobit/Pages/FAQ.aspx.
This document is a partial preview. Full document download can be found on Flevy:
http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
1
Flevy (www.flevy.com) is the marketplace
for premium documents. These
documents can range from Business
Frameworks to Financial Models to
PowerPoint Templates.
Flevy was founded under the principle that
companies waste a lot of time and money
recreating the same foundational business
documents. Our vision is for Flevy to
become a comprehensive knowledge base
of business documents. All organizations,
from startups to large enterprises, can use
Flevy— whether it's to jumpstart projects, to
find reference or comparison materials, or
just to learn.
Contact Us
Please contact us with any questions you may have
about our company.
• General Inquiries
support@flevy.com
• Media/PR
press@flevy.com
• Billing
billing@flevy.com

Contenu connexe

Plus de Flevy.com Best Practices

100 Case Studies on Strategy & Transformation.pdf
100 Case Studies on Strategy & Transformation.pdf100 Case Studies on Strategy & Transformation.pdf
100 Case Studies on Strategy & Transformation.pdf
Flevy.com Best Practices
 
Project Management for MBA (in French)
Project Management for MBA (in French)Project Management for MBA (in French)
Project Management for MBA (in French)
Flevy.com Best Practices
 
Customer-centric Culture
Customer-centric CultureCustomer-centric Culture
Customer-centric Culture
Flevy.com Best Practices
 
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
Flevy.com Best Practices
 
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
Flevy.com Best Practices
 
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
Flevy.com Best Practices
 
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
Flevy.com Best Practices
 
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
Flevy.com Best Practices
 
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
Flevy.com Best Practices
 
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
Flevy.com Best Practices
 
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
Flevy.com Best Practices
 
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
Flevy.com Best Practices
 

Plus de Flevy.com Best Practices (20)

100 Case Studies on Strategy & Transformation.pdf
100 Case Studies on Strategy & Transformation.pdf100 Case Studies on Strategy & Transformation.pdf
100 Case Studies on Strategy & Transformation.pdf
 
Project Management for MBA (in French)
Project Management for MBA (in French)Project Management for MBA (in French)
Project Management for MBA (in French)
 
4 Stages of Disruption
4 Stages of Disruption4 Stages of Disruption
4 Stages of Disruption
 
Customer-centric Culture
Customer-centric CultureCustomer-centric Culture
Customer-centric Culture
 
[Whitepaper] Business Transformation Success Factors
[Whitepaper] Business Transformation Success Factors[Whitepaper] Business Transformation Success Factors
[Whitepaper] Business Transformation Success Factors
 
[Whitepaper] 5 Dimensions of Employee Engagement Scorecard
[Whitepaper] 5 Dimensions of Employee Engagement Scorecard[Whitepaper] 5 Dimensions of Employee Engagement Scorecard
[Whitepaper] 5 Dimensions of Employee Engagement Scorecard
 
[Whitepaper] Digital Transformation: Workforce Digitization
[Whitepaper] Digital Transformation: Workforce Digitization[Whitepaper] Digital Transformation: Workforce Digitization
[Whitepaper] Digital Transformation: Workforce Digitization
 
[Whitepaper] Strategic Human Resources: Evolution of Competition
[Whitepaper] Strategic Human Resources: Evolution of Competition[Whitepaper] Strategic Human Resources: Evolution of Competition
[Whitepaper] Strategic Human Resources: Evolution of Competition
 
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
[Whitepaper] 8 Key Steps of Data Integration: Restructuring Redeployment Asse...
 
[Whitepaper] Strategy Classics: Value Disciplines Model
[Whitepaper] Strategy Classics: Value Disciplines Model[Whitepaper] Strategy Classics: Value Disciplines Model
[Whitepaper] Strategy Classics: Value Disciplines Model
 
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
[Whitepaper] The Definitive Guide to Strategic Planning: Here’s What You Need...
 
[Whitepaper] The Definitive Introduction to Strategy Development and Strategy...
[Whitepaper] The Definitive Introduction to Strategy Development and Strategy...[Whitepaper] The Definitive Introduction to Strategy Development and Strategy...
[Whitepaper] The Definitive Introduction to Strategy Development and Strategy...
 
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
[Whitepaper] The “Theory of Constraints:” What’s Limiting Your Organization?
 
[Whitepaper] Transportation Cost Reduction in Supply Chain Management
[Whitepaper] Transportation Cost Reduction in Supply Chain Management[Whitepaper] Transportation Cost Reduction in Supply Chain Management
[Whitepaper] Transportation Cost Reduction in Supply Chain Management
 
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
[Whitepaper] A Great Leadership Experience: Dr. Rachid Yazami, Inventor of th...
 
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
[Whitepaper] Finding It Hard to Manage Conflict at the Workplace? Use the Tho...
 
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
[Whitepaper] Key Account Management: Handling Large Global Accounts the Right...
 
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
[Whitepaper] Nudge Theory: An Effective Way to Transform Negative Behaviors
 
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
[Whitepaper] Business Model Innovation: Creation of Scalable Business Models ...
 
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
[Whitepaper] Shareholder Value Traps: How to Evade Them and Focus on Value Cr...
 

Dernier

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Dernier (20)

Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

The Complete Guide to DBA Practices & Procedures - Regulatory Compliance & DBA - Part 15

  • 1. Database Administration: The Complete Guide to Practices and Procedures Chapter 15 Regulatory Compliance and Database Administration
  • 2. SOX: Sarbanes-Oxley Act • The U.S. Public Accounting Reform and Investor Protection Act of 2002 (aka Sarbanes-Oxley or simply, SOX) – “…to use the full authority of the government to expose corruption, punish wrongdoers, and defend the rights & interests of American workers & investors.” – The primary objectives of SOX: • To strengthen and restore public confidence in corporate accountability and the accounting profession; • To strengthen enforcement of the federal securities laws; • To improve executive responsibility; • To improve disclosure and financial reporting; and • To improve the performance of “gatekeepers.” – Section 404 is the largest driver of SOX projects • It is the most important section for IT because the processes and internal controls are implemented primarily in IT systems; • …and much of the data is stored in a DBMS. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 3. FISMA: Federal Information Security Mgmt. Act • The E-Government Act was passed in 2002 as a response to terrorist threats – Title III of the act is named the Federal Information Security Management Act (FISMA). – FISMA basically states that federal agencies, contractors, and any entity that supports them, must maintain security commensurate with potential risk. – Officials are graded on the potential effect a security breach would have on their operations. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 4. Other Regulations & Issues? • And, there are more regulations to consider, for example: – the USA Patriot Act – Can SPAM Act of 2003 – Telecommunications Act of 1996 – The Data Quality Act • Additional regulations may be imposed on your partiuclar company or applications depending upon your industry, location, etc. • And do not forget that new regulations will continue to be written by government/industry and imposed over time… This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 5. Management Visibility • Impact: upper-level management is keenly aware of the need to comply, if not all of the details that involves. • Prosecution: being successfully prosecuted (see next slide) can result in huge fines and even imprisonment. • Cost: cost of complete compliance can be significant, but so can the cost of non-compliance. No longer easier just to ignore problems. • Durability: although there have been discussions about scaling back some laws (e.g. SOX), increasing regulations and therefore increasing time, effort, and capital will be spent on compliance. – That is, the issue will not just disappear if you ignore it long enough! • But, at the end of the day, ensuring exact compliance can be a gray area. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 6. The DBA and Regulatory Compliance Compliance-related tasks that impact database administration include: • Metadata Management and Data Quality • Database and Data Access Auditing • Data Masking and Obfuscation • Long-Term Data Retention and Database Archiving • Closer Tracking of Traditional DBA Tasks – (e.g. Change Management, Backup & Recovery) This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 7. Data Quality • Poor data quality costs the typical company at least ten percent (10%) of revenue; twenty percent (20%) is probably a better estimate.” Source: Thomas C. Redman, “Data: An Unfolding Quality Disaster”, DMReview Magazine, August 2004 Valid & Accurate? This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 8. Database Auditing and Data Access Tracking • Organizations today have to go well beyond just securing their data. • Companies have to perpetually monitor their systems in order to know who did exactly what, when and how -- to their data. • This can be accomplished with database auditing software – Also known as Data Access Tracking and Data Activity Monitoring This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 9. How to Audit Database Access? There are five techniques that can be used to audit database access: 1. Adding columns to tables 2. DBMS traces 3. Log based 4. Network sniffing 5. Capture requests at the serverThis document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 10. Limitations of Database Audit Traces Typically, the audit trace doesn’t record everything: – Auditing takes place only when the audit trace is on. – The trace does not record old data after it is changed (the log records old data). – If an agent or transaction accesses a table more than once in a single unit of recovery, the audit trace records only the first access. – The audit trace does not record accesses if you do not start the audit trace for the appropriate class of events. – The audit trace does not audit some utilities. The trace audits the first access of a table with the LOAD utility, but it does not audit access by the COPY, RECOVER, and REPAIR utilities. The audit trace does not audit access by stand-alone utilities, such as DSN1CHKR and DSN1PRNT. – The trace audits only the tables that you specifically choose to audit. – You cannot audit access Internal DBMS audit traces drain performance – Starting traces can “dim the lights” – DBAs don’t like them This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 11. Auditing Has to be at the Server Level • If you are not capturing all pertinent access requests at the server level, nefarious users can sneak in and not be caught. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 12. Should Be Able to Answer These Questions • Who accessed the data? • At what date and time was the access? • What program or client software was used to access the data? • From what location was the request issued? • What SQL was issued to access the data? • Was the request successful; and if so, how many rows of data were retrieved? • If the request was a modification, what data was changed? – A before and after image of the change should be accessible This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 13. Data Masking and Obfuscation Data masking is the process of protecting sensitive and personally identifiable information (PII) in non-production databases from inappropriate visibility. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 14. Data Masking Techniques • The substitution technique replaces existing data with random values from a pre-prepared data set. • The shuffling technique uses the existing data and moves the values between rows in such a way that the no values are present in their original rows. • The number and date variance technique varies the existing values in a specified range in order to obfuscate them. For example, birth date values could be changed within a range of plus or minus 90 days. • The encryption technique scrambles the data algorithmically. This technique will not produce realistic looking data and can make the data larger. • The nulling out technique simply removes the sensitive data by deleting it. • The table-to-table synchronization technique masks data assuring that the results are referentially intact. – If two tables contain columns with the same data values and those columns are masked in one table then the second table is updated with the changed value, too. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 15. Data Retention Drives Archiving • Data Retention Requirements refer to the length of time you need to keep data – Determined by laws – regulatory compliance • More than 150 state and federal laws • Dramatically increasing retention periods for corporate data – Determined by business needs • Reduce operational costs – Large volumes of data interfere with operations: performance, backup/recovery, etc. • Isolate content from changes – Protect archived data from modification This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 16. The Scope of Archiving This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 17. Closer Tracking of Traditional DBA Tasks • Regulatory compliance also can help to improve the focus on traditional DBA procedures and processes. • The accounting and regulatory demands of the regulations often require DBA practices to be strengthened and formalized. – Change management – Database backup and recovery. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 18. What is COBIT? • COBIT is a framework of IT best practices that companies can use to improve management over their IT organizations, to improve the value of IT, and to ensure that the goals of the IT organization are aligned with the goals of the business. – The current COBIT guidelines are available from the IT Governance Institute • ISACA (the Information Systems Audit and Control Association) • Following COBIT accomplishes the following: – Links IT and business goals – Identifies responsibilities of business and IT owners – monitors performance, evaluating it against metrics and maturity models. • The COBIT framework consists of 34 specific control objectives, organized into 4 domains. • Best practice frameworks like COBIT are vital tools for ensuring compliance with regulations such as Sarbanes-Oxley (SOX). http://www.isaca.org/Knowledge-Center/cobit/Pages/FAQ.aspx. This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/the-complete-guide-to-dba-practices-and-procedures-regulatory-compliance-and-dba-part-15-586
  • 19. 1 Flevy (www.flevy.com) is the marketplace for premium documents. These documents can range from Business Frameworks to Financial Models to PowerPoint Templates. Flevy was founded under the principle that companies waste a lot of time and money recreating the same foundational business documents. Our vision is for Flevy to become a comprehensive knowledge base of business documents. All organizations, from startups to large enterprises, can use Flevy— whether it's to jumpstart projects, to find reference or comparison materials, or just to learn. Contact Us Please contact us with any questions you may have about our company. • General Inquiries support@flevy.com • Media/PR press@flevy.com • Billing billing@flevy.com