SlideShare une entreprise Scribd logo
1  sur  53
Télécharger pour lire hors ligne
Database Security: What
                                                                                                  Gets Overlooked?
                                                                                       Cal Slemp, Managing Director, Protiviti
                                                                                    James Hulscher, Senior Manager, Protiviti

                                                                               The program will begin shortly. Please listen to the webinar
                                                                               through your computer with the speakers turned on.



0   © 2012 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Some Reminders . . .

    ASKING QUESTIONS Click on the “ASK A QUESTION” link
    at the top of your screen. Please provide your email
    address for a swift reply.
    Q&A There will be a Q&A session at the end of the
    presentation
    COPY OF SLIDES After the webinar, all attendees will be
    able to access the recording and the presentation slides
    POLLING QUESTIONS/VOTES Participation is voluntary.
    Results will be included in the slides.
    NEED HELP? If you need help during the webinar, click
    “RATE THIS”  “Not hearing audio? Click here for help”
1    © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Today’s Presenters

    Cal Slemp
      – Global Protiviti leader for IT Security & Privacy
      – 30+ years of experience in information technology risk & strategy
        consulting
      – Deep expertise in the pharmaceutical, manufacturing, consumer
        packaged goods and retail industries
    James Hulscher
      – 15 years of experience in IT
      – Manufacturing, education, health care, insurance, and financial
        services
      – Completing Ph.D. in Information Assurance with specialization in
        security
2   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Why Is Database Security Critical?

    Highly valuable asset – DATA
    Vulnerable
    Support business critical operations
    Data breach requirements
    Data leveraged for further attacks
    As strong as your weakest link
    Database attacks steadily increase




3   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Security Breaches Continue to Worsen

    2011 Yet another record-breaking year for security
    breaches




4   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Types of Attacks

    Attacks on organizational data infrastructure are
    becoming increasingly complex




5   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Tools and Resources

    Increased malware availability
    Rapidly advancing capability
    Organizational resources
    and pace are outstripped




6   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Who’s Responsible for the Data?

    The Challenge:


                   A proactive, evolving, and privacy-
                   focused strategy and methodology




7   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Who’s Responsible for the Data?

    Who in the organization is responsible for data security
    and privacy?




8   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Who’s Responsible for the Data?

              Everyone!

                                                                                                  – Security Team(s)
                                                                                                  – DBAs/Architects
                                                                                                  – Developers/Application Support
                                                                                                  – Network and Systems
                                                                                                    Administrators
                                                                                                  – End Users
                                                                                                  – Vendors (Extranets)



9   © 2011 Protiviti Inc.
    CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Security – Significant Loss




                                                                                                                                          $7.2
                                                                                                                                         Million


10   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – Data As the Target




11   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – Organized Attacks

     Typically, an organized group of malicious users, not
     just an individual, and typically globally.




12   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – Regulatory Requirements



     Compliance and regulatory requirements for
     organizations have significantly increased


     IT Auditors must understand the avenues to the data
     and the impacts of weak or missing controls


     More than just network penetration tests, vulnerability
     scans, database penetration tests


13   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – Consumer Awareness

     Consumer awareness of data theft =


     Financial Loss


     Reputation
     Damage




14   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – A Paradigm Shift




15   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
The Evolution of Data Security – A Paradigm Shift

     Comprehensive view of securing data, and the systems
     within the enterprise




16   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Why the Data?

     Data leakage can provide the information for a much
     more sophisticated attack on an organization


     Ultimately, the data
     will lead to some
     type of gain




17    © 2011 Protiviti Inc.
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Understanding Database Logging




18   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Understanding Database Logging

     Native Logging (Vendor Provided)
       – How did the user get to the DB?
       – How/when/who created the user?




19   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Monitoring

     Identifies:
        – Unauthorized changes to data structure
        – Illicit activity (e.g. mass data extract)
     Provides audit
     trails for compliance
     requirements




20    © 2011 Protiviti Inc.
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Monitoring

               Prevention and early detection for quick reaction




21   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
What Types of Changes Take Place Within a Database?

     DML is Data Manipulation Language
       – Insert
       – Select
       – Update
       – Delete




22   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
What Types of Changes Take Place Within a Database?

     DML attack via SQL Injection




23   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
What Types of Changes Take Place Within a Database?

     DCL is Data Control Language
       – Grant – Grant rights to an object or entire database
       – Revoke – Remove access rights to an object or database




24   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
What Types of Changes Take Place Within a Database?

     Why is DCL critical to DB functions?
       – A malicious user can grant/revoke
         rights to users, schemas,
         and applications
         that connect to a DB.




25   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology : Outside-In

     Tools
     Technologies
     Security Appliances
     Controls




26   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology : Outside-In

     Audit and systematic reviews of:
       – Database activity
       – DML/DCL changes from external sources




27   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology : Outside-In




                                                                                                                                 Types of access
                                                                                                                                 control




28   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology : Outside-In

     Encryption




29   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology : Inside-Out

     Internal attacks are likely, due to
        – Abuse of privileged and super user accounts
        – End users allowing code/malware to enter: email, social media,
          thumb drives
        – Abuse of data by organizational partners or service providers




30    © 2011 Protiviti Inc.
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology: Inside-Out

     Develop and encrypt data that can only be used by
     applications.




31   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology: Inside-Out

     Background check
     Financial monitoring
     Criminal monitoring




32   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology: Inside-Out

     Incident Preparation and Response




33   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Methodology: Inside-Out

     3rd Party audits
       – Deep database penetration tests
       – Reviews of database logs
       – Manual testing
         of applications




34   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Let’s Review Some Examples

     SQL Injections – How they work at a high level




35   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
SQL Example 1

     SQL Injection. Web-based
     application communicating with a
     backend database.


      “OLE DB Provider…ODBC
     SQL Driver [SQL Server}
     Error xxxxxxx error
     converting “ABC” into a
     column of data type int”




36   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
SQL Example 2

     Using http or a webpage once a footprint has been
     detected.


     http://ABCBank/index.asp?username=admin;
     password=1’ OR 1=1;--




37   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
What Is a Stored Procedure?

     Stored Procedures – the solution for preventing SQL
     Injections?




38   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
SQL Example 3

     Allowing direct SQL sessions to your database
       – telnet session
       – T-SQL
       – PL/SQL

                                                                                                      Example: SELECT userNAME
                                                                                                      from users where userNAME=‘ ‘;
                                                                                                      shutdown with nowait; --’ and
                                                                                                      userpass=‘ ‘




39   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Unification

     An example
       – DBO (Privileged Account) with no rights to write data to the server
       – Server admin creates DBO account for DBA
       – Consistency in password procedures?




40   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Further Unification Evaluation – Real World Examples

     Another example
       – Install of 3rd-party app requires admin rights
       – Password change may impact maintenance and support
       – Additional risks




41   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Auditing

     Database systems are both the most overlooked and the
     most crucial areas in need of securing


     Database security requirements in:
       – HIPPA                                                       - Dodd-Frank                                                        - US Patriot Act (AML)
       – HITECH                                                      - ISO 27000                                                         - Various Industry
       – SOX                                                         - PCI – DSS
       – GLBA                                                        - EU Data Protection Directive




42   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Auditing Database Errors

     Architecture reviews – applications and middleware




43   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Principles for Developing a Database Audit Strategy

                                                                                                                                         Protect the audit
                                                                                                                                         trail
                                                                                                                                         Audit mainstream
                                                                                                                                         activities
                                                                                                                                         Audit critical
                                                                                                                                         actions
                                                                                                                                         Archive audit
                                                                                                                                         records




44   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Controls are Critical




     Document
        – Storage management architecture
     Audit
        – At random times
        – Especially after migrations, upgrades, and during implementation




45    © 2011 Protiviti Inc.
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Database Improvements Will Enable Compliance

     Example – Configuration Parameters




46   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Tools and Resources

     Commercial Tools:
       – Acunetix – website vulnerability scanning tool


       – Nessus – vulnerability assessment scanning tool


     Freely Available:
       – BackTrack5 – Numerous vulnerability
         assessment tools

       – Havij – Find SQL Injection vulnerabilities


47   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
2012 and the Continued Evolution

     Data protection requirements will increase


     More mobile devices


     Social media = more
     ways to share data


     Know your data



48   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
Contact Information

     For more information about our approach to database
     security, including database logging and database
     monitoring, please contact


        Jim Hulscher
                                               601 Carlson Parkway
                                               Suite 1120
                                               Minnetonka, MN 55305 USA
                                               Direct: 952.249.2219
                                               james.hulscher@protiviti.com



        Powerful Insights. Proven Delivery. ®




49    © 2011 Protiviti Inc.
      CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
VOTES




50   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
VOTES




51   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
VOTES




52   © 2011 Protiviti Inc.
     CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.

Contenu connexe

Tendances

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usenrjstevens
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment swedenIBM Sverige
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityLumension
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Serverswebhostingguy
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
 

Tendances (20)

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Mtw03008 usen
Mtw03008 usenMtw03008 usen
Mtw03008 usen
 
NEtwork Security Admin Portal
NEtwork Security Admin PortalNEtwork Security Admin Portal
NEtwork Security Admin Portal
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Data security in a big data environment sweden
Data security in a big data environment   swedenData security in a big data environment   sweden
Data security in a big data environment sweden
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Data, data slides
Data, data  slidesData, data  slides
Data, data slides
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Servers
 
Apps fundamentals
Apps fundamentalsApps fundamentals
Apps fundamentals
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...
 

En vedette

Database security copy
Database security   copyDatabase security   copy
Database security copyfika sweety
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-dbuncleRhyme
 
Think Like a Hacker - Database Attack Vectors
Think Like a Hacker - Database Attack VectorsThink Like a Hacker - Database Attack Vectors
Think Like a Hacker - Database Attack VectorsMark Ginnebaugh
 
Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?Ellie Ahmadi
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]LinkedIn
 

En vedette (8)

Database security copy
Database security   copyDatabase security   copy
Database security copy
 
01 database security ent-db
01  database security ent-db01  database security ent-db
01 database security ent-db
 
Think Like a Hacker - Database Attack Vectors
Think Like a Hacker - Database Attack VectorsThink Like a Hacker - Database Attack Vectors
Think Like a Hacker - Database Attack Vectors
 
Database security
Database securityDatabase security
Database security
 
Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?
 
WTF?
WTF? WTF?
WTF?
 
Database Security
Database SecurityDatabase Security
Database Security
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 

Similaire à Database Security: What Gets Overlooked?

Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBrent Spencer
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsImperva
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365AntonioMaio2
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009RCioffi
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxjackiewalcutt
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxhartrobert670
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems IntegrationStephen Lahanas
 

Similaire à Database Security: What Gets Overlooked? (20)

Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
Intersect
IntersectIntersect
Intersect
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
Risks vs real life
Risks vs real lifeRisks vs real life
Risks vs real life
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docx
 
Botnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docxBotnet attack is where group of devices are infected by malware th.docx
Botnet attack is where group of devices are infected by malware th.docx
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Semantic Systems Integration
Semantic Systems IntegrationSemantic Systems Integration
Semantic Systems Integration
 

Database Security: What Gets Overlooked?

  • 1. Database Security: What Gets Overlooked? Cal Slemp, Managing Director, Protiviti James Hulscher, Senior Manager, Protiviti The program will begin shortly. Please listen to the webinar through your computer with the speakers turned on. 0 © 2012 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 2. Some Reminders . . . ASKING QUESTIONS Click on the “ASK A QUESTION” link at the top of your screen. Please provide your email address for a swift reply. Q&A There will be a Q&A session at the end of the presentation COPY OF SLIDES After the webinar, all attendees will be able to access the recording and the presentation slides POLLING QUESTIONS/VOTES Participation is voluntary. Results will be included in the slides. NEED HELP? If you need help during the webinar, click “RATE THIS”  “Not hearing audio? Click here for help” 1 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 3. Today’s Presenters Cal Slemp – Global Protiviti leader for IT Security & Privacy – 30+ years of experience in information technology risk & strategy consulting – Deep expertise in the pharmaceutical, manufacturing, consumer packaged goods and retail industries James Hulscher – 15 years of experience in IT – Manufacturing, education, health care, insurance, and financial services – Completing Ph.D. in Information Assurance with specialization in security 2 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 4. Why Is Database Security Critical? Highly valuable asset – DATA Vulnerable Support business critical operations Data breach requirements Data leveraged for further attacks As strong as your weakest link Database attacks steadily increase 3 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 5. Security Breaches Continue to Worsen 2011 Yet another record-breaking year for security breaches 4 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 6. Database Security – Types of Attacks Attacks on organizational data infrastructure are becoming increasingly complex 5 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 7. Database Security – Tools and Resources Increased malware availability Rapidly advancing capability Organizational resources and pace are outstripped 6 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 8. Database Security – Who’s Responsible for the Data? The Challenge: A proactive, evolving, and privacy- focused strategy and methodology 7 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 9. Database Security – Who’s Responsible for the Data? Who in the organization is responsible for data security and privacy? 8 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 10. Database Security – Who’s Responsible for the Data? Everyone! – Security Team(s) – DBAs/Architects – Developers/Application Support – Network and Systems Administrators – End Users – Vendors (Extranets) 9 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 11. Database Security – Significant Loss $7.2 Million 10 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 12. The Evolution of Data Security – Data As the Target 11 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 13. The Evolution of Data Security – Organized Attacks Typically, an organized group of malicious users, not just an individual, and typically globally. 12 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 14. The Evolution of Data Security – Regulatory Requirements Compliance and regulatory requirements for organizations have significantly increased IT Auditors must understand the avenues to the data and the impacts of weak or missing controls More than just network penetration tests, vulnerability scans, database penetration tests 13 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 15. The Evolution of Data Security – Consumer Awareness Consumer awareness of data theft = Financial Loss Reputation Damage 14 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 16. The Evolution of Data Security – A Paradigm Shift 15 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 17. The Evolution of Data Security – A Paradigm Shift Comprehensive view of securing data, and the systems within the enterprise 16 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 18. Why the Data? Data leakage can provide the information for a much more sophisticated attack on an organization Ultimately, the data will lead to some type of gain 17 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 19. Understanding Database Logging 18 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 20. Understanding Database Logging Native Logging (Vendor Provided) – How did the user get to the DB? – How/when/who created the user? 19 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 21. Database Monitoring Identifies: – Unauthorized changes to data structure – Illicit activity (e.g. mass data extract) Provides audit trails for compliance requirements 20 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 22. Database Monitoring Prevention and early detection for quick reaction 21 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 23. What Types of Changes Take Place Within a Database? DML is Data Manipulation Language – Insert – Select – Update – Delete 22 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 24. What Types of Changes Take Place Within a Database? DML attack via SQL Injection 23 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 25. What Types of Changes Take Place Within a Database? DCL is Data Control Language – Grant – Grant rights to an object or entire database – Revoke – Remove access rights to an object or database 24 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 26. What Types of Changes Take Place Within a Database? Why is DCL critical to DB functions? – A malicious user can grant/revoke rights to users, schemas, and applications that connect to a DB. 25 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 27. Methodology : Outside-In Tools Technologies Security Appliances Controls 26 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 28. Methodology : Outside-In Audit and systematic reviews of: – Database activity – DML/DCL changes from external sources 27 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 29. Methodology : Outside-In Types of access control 28 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 30. Methodology : Outside-In Encryption 29 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 31. Methodology : Inside-Out Internal attacks are likely, due to – Abuse of privileged and super user accounts – End users allowing code/malware to enter: email, social media, thumb drives – Abuse of data by organizational partners or service providers 30 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 32. Methodology: Inside-Out Develop and encrypt data that can only be used by applications. 31 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 33. Methodology: Inside-Out Background check Financial monitoring Criminal monitoring 32 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 34. Methodology: Inside-Out Incident Preparation and Response 33 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 35. Methodology: Inside-Out 3rd Party audits – Deep database penetration tests – Reviews of database logs – Manual testing of applications 34 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 36. Let’s Review Some Examples SQL Injections – How they work at a high level 35 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 37. SQL Example 1 SQL Injection. Web-based application communicating with a backend database. “OLE DB Provider…ODBC SQL Driver [SQL Server} Error xxxxxxx error converting “ABC” into a column of data type int” 36 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 38. SQL Example 2 Using http or a webpage once a footprint has been detected. http://ABCBank/index.asp?username=admin; password=1’ OR 1=1;-- 37 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 39. What Is a Stored Procedure? Stored Procedures – the solution for preventing SQL Injections? 38 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 40. SQL Example 3 Allowing direct SQL sessions to your database – telnet session – T-SQL – PL/SQL Example: SELECT userNAME from users where userNAME=‘ ‘; shutdown with nowait; --’ and userpass=‘ ‘ 39 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 41. Unification An example – DBO (Privileged Account) with no rights to write data to the server – Server admin creates DBO account for DBA – Consistency in password procedures? 40 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 42. Further Unification Evaluation – Real World Examples Another example – Install of 3rd-party app requires admin rights – Password change may impact maintenance and support – Additional risks 41 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 43. Database Auditing Database systems are both the most overlooked and the most crucial areas in need of securing Database security requirements in: – HIPPA - Dodd-Frank - US Patriot Act (AML) – HITECH - ISO 27000 - Various Industry – SOX - PCI – DSS – GLBA - EU Data Protection Directive 42 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 44. Auditing Database Errors Architecture reviews – applications and middleware 43 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 45. Principles for Developing a Database Audit Strategy Protect the audit trail Audit mainstream activities Audit critical actions Archive audit records 44 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 46. Controls are Critical Document – Storage management architecture Audit – At random times – Especially after migrations, upgrades, and during implementation 45 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 47. Database Improvements Will Enable Compliance Example – Configuration Parameters 46 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 48. Tools and Resources Commercial Tools: – Acunetix – website vulnerability scanning tool – Nessus – vulnerability assessment scanning tool Freely Available: – BackTrack5 – Numerous vulnerability assessment tools – Havij – Find SQL Injection vulnerabilities 47 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 49. 2012 and the Continued Evolution Data protection requirements will increase More mobile devices Social media = more ways to share data Know your data 48 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 50. Contact Information For more information about our approach to database security, including database logging and database monitoring, please contact Jim Hulscher 601 Carlson Parkway Suite 1120 Minnetonka, MN 55305 USA Direct: 952.249.2219 james.hulscher@protiviti.com Powerful Insights. Proven Delivery. ® 49 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 51. VOTES 50 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 52. VOTES 51 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.
  • 53. VOTES 52 © 2011 Protiviti Inc. CONFIDENTIAL: This document is for your company's internal use only and may not be copied nor distributed to another third party.