SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Tennessee Board of Regents
             DBA Collaborative




         Security:

It’s everyone's responsibility


                                            Presented by:

                                         Jeff Hinds, DBA
                                       Greg Turmel, DBA
Tennessee Board of Regents
                          DBA Collaborative




       Securing all levels of Information Access

UNIX Level:                                   User Accounts

Source Database Level:                        User accounts

Mid-Tier Level:                               Application accounts

Operational Data Store:                       ETL

Enterprise Data Warehouse:                    Application Accounts

Reporting Application Level: Argos reporting
Tennessee Board of Regents
                               DBA Collaborative



              Securing all levels of Information Access

Hardware sharing     – Multiple databases on single server
                       : reduced security on one, exposes others
                       : 3 Tier Model for separation of Hardware

Listener sharing     – Multiple databases on a single listener
                       : if taken down, affects all services
                       : password protecting

INB / SSB sharing    – Multiple services supporting many User
                       interfaces
                        : if hacked, gains access to all apps on box
                        : resource limitation causing DOS
                                             (denial of service)
                        : network / application time outs
Tennessee Board of Regents
                     DBA Collaborative



Database Security using PROFILES:

       – When to use, How to use, Why should you use.

Example:      CREATE PROFILE TBR_DBA      LIMIT
               SESSIONS_PER_USER          DEFAULT
               CPU_PER_SESSION            DEFAULT
               CPU_PER_CALL               DEFAULT
               CONNECT_TIME               DEFAULT
               IDLE_TIME                  DEFAULT
               LOGICAL_READS_PER_SESSION  DEFAULT
               LOGICAL_READS_PER_CALL     DEFAULT
               COMPOSITE_LIMIT            DEFAULT
               PRIVATE_SGA                DEFAULT
               FAILED_LOGIN_ATTEMPTS 3
               PASSWORD_LIFE_TIME         90
               PASSWORD_REUSE_TIME        UNLIMITED
               PASSWORD_REUSE_MAX         5
               PASSWORD_LOCK_TIME         .0415
               PASSWORD_GRACE_TIME        7
               PASSWORD_VERIFY_FUNCTION VERIFY_FUNCTION;
Tennessee Board of Regents
                       DBA Collaborative




Database Security using ROLES:

       – What are roles, what can I do with them, Why?

Example:
              CREATE ROLE TBR_DEV NOT IDENTIFIED;

              GRANT ALTER ANY INDEX TO TBR_DEV;
              GRANT ALTER ANY TABLE TO TBR_DEV;

              GRANT DELETE ANY TABLE TO TBR_DEV;
              GRANT INSERT ANY TABLE TO TBR_DEV;
              GRANT SELECT ANY TABLE TO TBR_DEV;
              GRANT UPDATE ANY TABLE TO TBR_DEV;

              GRANT ALTER ANY TRIGGER TO TBR_DEV;
              GRANT CREATE ANY SYNONYM TO TBR_DEV;
              GRANT SELECT ANY SEQUENCE TO TBR_DEV;
              GRANT EXECUTE ANY PROCEDURE TO TBR_DEV;
Tennessee Board of Regents
                DBA Collaborative



Securing all levels of Information Access
Tennessee Board of Regents
                DBA Collaborative



Securing all levels of Information Access
Tennessee Board of Regents
               DBA Collaborative



Securing all levels of Information Access
                                         Network Devices
                                         Applications
                                         Databases
                                         Servers
                                         Desktops / Laptops
                                         Printers: Yes, but why?
                                         Backups: Yes, but why?
Tennessee Board of Regents
                                       DBA Collaborative



               Securing user access with password complexity

Password Verify function:
      ALTER PROFILE TBR_DBA LIMIT
      PASSWORD_VERIFY_FUNCTION VERIFY_FUNCTION
      /
BEGIN
         digitarray:= '0123456789';
         chararray:='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
         punctarray:='!"#$%&()``*+,-/:;<=>?_';

Alternatives:
          – Refrain from using PW verify function in your user profiles when another
            authentication process is defined outside of the Oracle database profile
                   Examples:
                            LUMINIS authentication
                            LDAP authentication
                            Active Directory authentication
Tennessee Board of Regents
                                                     DBA Collaborative


                                        DATA SECURITY BREACHES
                                 (REPORTED IN THE PRESS SINCE MARCH 2005)
                                     SOURCE: Privacy Rights Clearinghouse
DATE             NAME (Location)              TYPE OF BREACH                             INDIVIDUALS NOTIFIED

December 2007    Voter Registration Office – Nashville TN.     Laptops stolen:                         100,000+

Sept. 22, 2006   Purdue University College of Science          A file in a desktop computer in the
                                                               Chemistry Department may have been
                                                               accessed illegitimately. The file contained
                                                               names, SSNs, school, major, and e-mail
                                                               addresses of people who were students in 2000.
                                                                                                          2,482


Jan. 23, 2006    Univ. of Notre Dame                           Hackers accessed Social Security
                                                               numbers, credit card information and check
                                                               images of school donors.                Unknown

March 28, 2005   U Chicago Hospital (Chicago, IL)              Dishonest insider                       Unknown

Sept. 15, 2005   Miami Univ.                                   Exposed online                          21,762

Sept. 22, 2005   City University of New York                   Exposed online                          350

Dec. 16, 2005    Colorado Tech. Univ.                          Email erroneously sent containing names,
                                                               phone numbers, email addresses, Social
                                                               Security numbers and class schedules. 1,200


http://www.washington.edu/president/tacs/utac/meetings/2006-07/materials/10.03.data.security.breaches.report.pdf
Tennessee Board of Regents
                               DBA Collaborative



       Securing Access: both physical as well as virtual



TOTALS         95 Incidents:               Types of Incidents:
                                           53 external hacks
                                           20 stolen//lost (2) computers
                                           11 handling errors
                                           8 exposed online
                                           1 armed robbery
                                           1 stolen storage device
                                           1 malicious insider

Total Number of Individuals Notified: 3,024,217
       (including unknowns…maybe as high as 3.2 - 3.5 million)
Tennessee Board of Regents
                           DBA Collaborative



       Security: Application Information Access


Banner Security Classes:              Job Role classes (BANSECR)

                                      Finance (FOMPROF)

                                      BAN_DEFAULT_ROLES

Oracle Default Roles:                 DBA

                                      RESOURCE

Oracle Grants:                        SELECT ANY (table, dictionary)

                                      EXECUTE ANY (procedure)

Third Party:                          Evisions, Argos, Appworx, etc.
Tennessee Board of Regents
                            DBA Collaborative



            Security: Application Information Access

Banner Passwords:               Business Rules / Procedures


Oracle Passwords:                           “         “


UNIX Passwords:                             “         “


Third Party Apps:                           “         “


Firewall access:                Ports, IP, SSL, services
Tennessee Board of Regents
                               DBA Collaborative



          Security: Application Information Access
Oracle DBA Access:                    Establish Business Rules / Procedures


UNIX Admin Access:                                “            “

BANSECR Security Admin:                           “            “

Argos Reporting Admin Access:                     “            “

Finance / Payroll Access:                         “            “

Developer / Programmer Access:                    “            “

TNSNAMES netconfig information:                   “            “

Source System Access:                             “            “

Target System Access:                             “            “

ETL / data feed Access:                           “            “
                                            Federal / State Legislature (law), HIPPA, SOX404, etc…
Tennessee Board of Regents
                                    DBA Collaborative


                   Contact Information:     http://idba.tbr.edu
                     iDBA WEB Site:            idba.tbr.edu


Jeff D. Hinds, ocp
Database Administrator
Tennessee Board of Regents
1415 Murfreesboro Road, Suite 358
Nashville, TN 37217
Email: jeff.hinds@tbr.edu
(Office) 615.366.4488


Greg Turmel
Database Administrator
Tennessee Board of Regents
1415 Murfreesboro Rd. Suite 358
Nashville, TN. 37217
Email: greg.turmel@tbr.edu
(Office) 615.366.4467

Contenu connexe

En vedette

It symposium 2011-ods821_data_replication_04-11-2011
It symposium 2011-ods821_data_replication_04-11-2011It symposium 2011-ods821_data_replication_04-11-2011
It symposium 2011-ods821_data_replication_04-11-2011Greg Turmel
 
Summit 2009 performance-tuning_banner
Summit 2009 performance-tuning_bannerSummit 2009 performance-tuning_banner
Summit 2009 performance-tuning_bannerGreg Turmel
 
Ky thuat quay phim
Ky thuat quay phimKy thuat quay phim
Ky thuat quay phimVâng Nghèo
 
Videoky thuat-quay-phim-131106032328-phpapp02
Videoky thuat-quay-phim-131106032328-phpapp02Videoky thuat-quay-phim-131106032328-phpapp02
Videoky thuat-quay-phim-131106032328-phpapp02Vâng Nghèo
 
Theits 2014 iaa s saas strategic focus
Theits 2014 iaa s saas strategic focusTheits 2014 iaa s saas strategic focus
Theits 2014 iaa s saas strategic focusGreg Turmel
 
Replication using golden gate 11g
Replication using golden gate 11gReplication using golden gate 11g
Replication using golden gate 11gGreg Turmel
 
Chuyển động máy quay
Chuyển động máy quayChuyển động máy quay
Chuyển động máy quayVâng Nghèo
 

En vedette (9)

Basic of Fundraising
Basic of FundraisingBasic of Fundraising
Basic of Fundraising
 
It symposium 2011-ods821_data_replication_04-11-2011
It symposium 2011-ods821_data_replication_04-11-2011It symposium 2011-ods821_data_replication_04-11-2011
It symposium 2011-ods821_data_replication_04-11-2011
 
Summit 2009 performance-tuning_banner
Summit 2009 performance-tuning_bannerSummit 2009 performance-tuning_banner
Summit 2009 performance-tuning_banner
 
Social media uitbesteden_artikel
Social media uitbesteden_artikelSocial media uitbesteden_artikel
Social media uitbesteden_artikel
 
Ky thuat quay phim
Ky thuat quay phimKy thuat quay phim
Ky thuat quay phim
 
Videoky thuat-quay-phim-131106032328-phpapp02
Videoky thuat-quay-phim-131106032328-phpapp02Videoky thuat-quay-phim-131106032328-phpapp02
Videoky thuat-quay-phim-131106032328-phpapp02
 
Theits 2014 iaa s saas strategic focus
Theits 2014 iaa s saas strategic focusTheits 2014 iaa s saas strategic focus
Theits 2014 iaa s saas strategic focus
 
Replication using golden gate 11g
Replication using golden gate 11gReplication using golden gate 11g
Replication using golden gate 11g
 
Chuyển động máy quay
Chuyển động máy quayChuyển động máy quay
Chuyển động máy quay
 

Similaire à It symposium 2008 fcf-security_is_everyones_responsibility

CSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database ManagementCSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database ManagementYhal Htet Aung
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these daysEssaysREasy
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Osecarrow
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Sourcehack33
 
Db for rdbms
Db for rdbmsDb for rdbms
Db for rdbmsTech_MX
 
Lect 30 dbms_fundamentals
Lect 30  dbms_fundamentalsLect 30  dbms_fundamentals
Lect 30 dbms_fundamentalsProtik Roy
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdfHODCA1
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social ApplicationsTyler Browning
 
IAPP PSR 2022: How do you engineer DSAR for Complexity?
IAPP PSR 2022: How do you engineer DSAR for Complexity?IAPP PSR 2022: How do you engineer DSAR for Complexity?
IAPP PSR 2022: How do you engineer DSAR for Complexity?Cillian Kieran
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesSafety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesPostgreSQL Experts, Inc.
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Bit Level Preservation
Bit Level PreservationBit Level Preservation
Bit Level PreservationMicah Altman
 

Similaire à It symposium 2008 fcf-security_is_everyones_responsibility (20)

Information Management
Information ManagementInformation Management
Information Management
 
CSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database ManagementCSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database Management
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
Mis05
Mis05Mis05
Mis05
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Db for rdbms
Db for rdbmsDb for rdbms
Db for rdbms
 
Lect 30 dbms_fundamentals
Lect 30  dbms_fundamentalsLect 30  dbms_fundamentals
Lect 30 dbms_fundamentals
 
1 security goals
1   security goals1   security goals
1 security goals
 
5db-security.pdf
5db-security.pdf5db-security.pdf
5db-security.pdf
 
DB security
 DB security DB security
DB security
 
Network security
Network security Network security
Network security
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social Applications
 
2ndlec.database
2ndlec.database2ndlec.database
2ndlec.database
 
IAPP PSR 2022: How do you engineer DSAR for Complexity?
IAPP PSR 2022: How do you engineer DSAR for Complexity?IAPP PSR 2022: How do you engineer DSAR for Complexity?
IAPP PSR 2022: How do you engineer DSAR for Complexity?
 
Safety LAMP: data security & agile languages
Safety LAMP: data security & agile languagesSafety LAMP: data security & agile languages
Safety LAMP: data security & agile languages
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Bit Level Preservation
Bit Level PreservationBit Level Preservation
Bit Level Preservation
 
Electronic Records
Electronic RecordsElectronic Records
Electronic Records
 

Dernier

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

It symposium 2008 fcf-security_is_everyones_responsibility

  • 1. Tennessee Board of Regents DBA Collaborative Security: It’s everyone's responsibility Presented by: Jeff Hinds, DBA Greg Turmel, DBA
  • 2. Tennessee Board of Regents DBA Collaborative Securing all levels of Information Access UNIX Level: User Accounts Source Database Level: User accounts Mid-Tier Level: Application accounts Operational Data Store: ETL Enterprise Data Warehouse: Application Accounts Reporting Application Level: Argos reporting
  • 3. Tennessee Board of Regents DBA Collaborative Securing all levels of Information Access Hardware sharing – Multiple databases on single server : reduced security on one, exposes others : 3 Tier Model for separation of Hardware Listener sharing – Multiple databases on a single listener : if taken down, affects all services : password protecting INB / SSB sharing – Multiple services supporting many User interfaces : if hacked, gains access to all apps on box : resource limitation causing DOS (denial of service) : network / application time outs
  • 4. Tennessee Board of Regents DBA Collaborative Database Security using PROFILES: – When to use, How to use, Why should you use. Example: CREATE PROFILE TBR_DBA LIMIT SESSIONS_PER_USER DEFAULT CPU_PER_SESSION DEFAULT CPU_PER_CALL DEFAULT CONNECT_TIME DEFAULT IDLE_TIME DEFAULT LOGICAL_READS_PER_SESSION DEFAULT LOGICAL_READS_PER_CALL DEFAULT COMPOSITE_LIMIT DEFAULT PRIVATE_SGA DEFAULT FAILED_LOGIN_ATTEMPTS 3 PASSWORD_LIFE_TIME 90 PASSWORD_REUSE_TIME UNLIMITED PASSWORD_REUSE_MAX 5 PASSWORD_LOCK_TIME .0415 PASSWORD_GRACE_TIME 7 PASSWORD_VERIFY_FUNCTION VERIFY_FUNCTION;
  • 5. Tennessee Board of Regents DBA Collaborative Database Security using ROLES: – What are roles, what can I do with them, Why? Example: CREATE ROLE TBR_DEV NOT IDENTIFIED; GRANT ALTER ANY INDEX TO TBR_DEV; GRANT ALTER ANY TABLE TO TBR_DEV; GRANT DELETE ANY TABLE TO TBR_DEV; GRANT INSERT ANY TABLE TO TBR_DEV; GRANT SELECT ANY TABLE TO TBR_DEV; GRANT UPDATE ANY TABLE TO TBR_DEV; GRANT ALTER ANY TRIGGER TO TBR_DEV; GRANT CREATE ANY SYNONYM TO TBR_DEV; GRANT SELECT ANY SEQUENCE TO TBR_DEV; GRANT EXECUTE ANY PROCEDURE TO TBR_DEV;
  • 6. Tennessee Board of Regents DBA Collaborative Securing all levels of Information Access
  • 7. Tennessee Board of Regents DBA Collaborative Securing all levels of Information Access
  • 8. Tennessee Board of Regents DBA Collaborative Securing all levels of Information Access Network Devices Applications Databases Servers Desktops / Laptops Printers: Yes, but why? Backups: Yes, but why?
  • 9. Tennessee Board of Regents DBA Collaborative Securing user access with password complexity Password Verify function: ALTER PROFILE TBR_DBA LIMIT PASSWORD_VERIFY_FUNCTION VERIFY_FUNCTION / BEGIN digitarray:= '0123456789'; chararray:='abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ'; punctarray:='!"#$%&()``*+,-/:;<=>?_'; Alternatives: – Refrain from using PW verify function in your user profiles when another authentication process is defined outside of the Oracle database profile Examples: LUMINIS authentication LDAP authentication Active Directory authentication
  • 10. Tennessee Board of Regents DBA Collaborative DATA SECURITY BREACHES (REPORTED IN THE PRESS SINCE MARCH 2005) SOURCE: Privacy Rights Clearinghouse DATE NAME (Location) TYPE OF BREACH INDIVIDUALS NOTIFIED December 2007 Voter Registration Office – Nashville TN. Laptops stolen: 100,000+ Sept. 22, 2006 Purdue University College of Science A file in a desktop computer in the Chemistry Department may have been accessed illegitimately. The file contained names, SSNs, school, major, and e-mail addresses of people who were students in 2000. 2,482 Jan. 23, 2006 Univ. of Notre Dame Hackers accessed Social Security numbers, credit card information and check images of school donors. Unknown March 28, 2005 U Chicago Hospital (Chicago, IL) Dishonest insider Unknown Sept. 15, 2005 Miami Univ. Exposed online 21,762 Sept. 22, 2005 City University of New York Exposed online 350 Dec. 16, 2005 Colorado Tech. Univ. Email erroneously sent containing names, phone numbers, email addresses, Social Security numbers and class schedules. 1,200 http://www.washington.edu/president/tacs/utac/meetings/2006-07/materials/10.03.data.security.breaches.report.pdf
  • 11. Tennessee Board of Regents DBA Collaborative Securing Access: both physical as well as virtual TOTALS 95 Incidents: Types of Incidents: 53 external hacks 20 stolen//lost (2) computers 11 handling errors 8 exposed online 1 armed robbery 1 stolen storage device 1 malicious insider Total Number of Individuals Notified: 3,024,217 (including unknowns…maybe as high as 3.2 - 3.5 million)
  • 12. Tennessee Board of Regents DBA Collaborative Security: Application Information Access Banner Security Classes: Job Role classes (BANSECR) Finance (FOMPROF) BAN_DEFAULT_ROLES Oracle Default Roles: DBA RESOURCE Oracle Grants: SELECT ANY (table, dictionary) EXECUTE ANY (procedure) Third Party: Evisions, Argos, Appworx, etc.
  • 13. Tennessee Board of Regents DBA Collaborative Security: Application Information Access Banner Passwords: Business Rules / Procedures Oracle Passwords: “ “ UNIX Passwords: “ “ Third Party Apps: “ “ Firewall access: Ports, IP, SSL, services
  • 14. Tennessee Board of Regents DBA Collaborative Security: Application Information Access Oracle DBA Access: Establish Business Rules / Procedures UNIX Admin Access: “ “ BANSECR Security Admin: “ “ Argos Reporting Admin Access: “ “ Finance / Payroll Access: “ “ Developer / Programmer Access: “ “ TNSNAMES netconfig information: “ “ Source System Access: “ “ Target System Access: “ “ ETL / data feed Access: “ “ Federal / State Legislature (law), HIPPA, SOX404, etc…
  • 15. Tennessee Board of Regents DBA Collaborative Contact Information: http://idba.tbr.edu iDBA WEB Site: idba.tbr.edu Jeff D. Hinds, ocp Database Administrator Tennessee Board of Regents 1415 Murfreesboro Road, Suite 358 Nashville, TN 37217 Email: jeff.hinds@tbr.edu (Office) 615.366.4488 Greg Turmel Database Administrator Tennessee Board of Regents 1415 Murfreesboro Rd. Suite 358 Nashville, TN. 37217 Email: greg.turmel@tbr.edu (Office) 615.366.4467