SlideShare une entreprise Scribd logo
1  sur  19
Enforcing Compliance With Policy-Based Management Ken Simmons, DBA
Contact Info Blog: http://cybersql.blogspot.com/ Email: kensimmonsii@gmail.com Twitter: @KenSimmons LinkedIN: http://www.linkedin.com/in/kensimmons
What is Compliance? “Conformity in fulfilling official requirements”* External Regulations HIPAA SOX PCI Internal Standards Naming Conventions http://www.flickr.com/photos/dunechaser/220636504/ *http://www.merriam-webster.com/dictionary/compliance
More than 494 million records have been breached since 2005* Unintended Disclosure  Payment Card Fraud Physical Loss (Non-Electronic)  Insider Hacking or Malware Portable Device Loss Stationary Device Loss Why Does Compliance Matter? 474 million http://www.flickr.com/photos/bheathr/2253526798 *http://www.privacyrights.org/data-breach/
What’s The Process? Identify Risks Develop Policies To Mitigate Risks Ensure Policies Are Being Enforced Risk Management Governance Compliance
Policy-Based Management Can Help! Gives you the ability to define and enforce standards Auditors Love Policies It is NOT and Enterprise Edition Feature http://www.flickr.com/photos/dunechaser/489467800/
The BIG Picture Servers CMS SQL 2008
EPMFramework http://epmframework.codeplex.com
PBM L33T Speak Targets are objects such as a Instances, Databases, Tables, etc. Facets expose logical groupings of properties for those objects. Conditions are made up of expressions exposed by the properties from a single Facet. A Policy evaluates a Condition against one or more Targets.
Creating Policies Export the Current State of an Object Import Predefined Policies Create Custom Policies Based on Facets Create Custom Policies using Advanced Conditions
Evaluating Policies On Demand Can “Auto Fix” Certain Violations OnSchedule Uses SQL Agent Job On Change – Log Only Writes Violations to SQL and Windows Log On Change – Prevent  Uses DDL Triggers to Rollback Changes
Demo http://www.flickr.com/photos/winterhalter/2883847843/
Alerts Error Number by Evaluation Mode On change: prevent (automatic), 34050 On change: prevent (on demand), 34051 On schedule, 34052 On change, 34053 Prerequisites Configure Database Mail Create Operator Configure SQL Agent
Server Configuration Predefined Best Practice Policies ,[object Object]
SAC for Database Engine 2008 FeaturesService Account Server Facet: Service Account != 'LocalSystem' Log Retention Server Facet: NumberOfLogFiles = 99
Security Advanced Conditions ,[object Object]
SELECT COUNT(*) FROM sysloginsWHERE name = 'Builtindministrators'
SA Account Disabled
SELECT COUNT(*)FROM sysloginsWHERE name = 'sa' ANDis_disabled = 0Note: Using syslogins instead of sys.server_principals allows you to          evaluate SQL 2000 Instances

Contenu connexe

En vedette

Escera el cervell
Escera el cervellEscera el cervell
Escera el cervellcultura 3.0
 
The Art Of Indexing
The Art Of IndexingThe Art Of Indexing
The Art Of IndexingKenSimmons
 
Cultivating a Downtown Marketplace--Staunton, VA
Cultivating a Downtown Marketplace--Staunton, VA Cultivating a Downtown Marketplace--Staunton, VA
Cultivating a Downtown Marketplace--Staunton, VA SDDA
 
Evolution of a Main Street
Evolution of a Main StreetEvolution of a Main Street
Evolution of a Main StreetSDDA
 
Evolution of a Main Street
Evolution of a Main StreetEvolution of a Main Street
Evolution of a Main StreetSDDA
 
Liberating genius by Tammy Dunbar
Liberating genius by Tammy DunbarLiberating genius by Tammy Dunbar
Liberating genius by Tammy DunbarKornelia Lohynova
 
Memories of our summer vacation
 Memories of our summer vacation  Memories of our summer vacation
Memories of our summer vacation Kornelia Lohynova
 
Entrepreneurship in education
Entrepreneurship in educationEntrepreneurship in education
Entrepreneurship in educationKornelia Lohynova
 
The erotic brain by adolf tobeña
The erotic brain by adolf tobeñaThe erotic brain by adolf tobeña
The erotic brain by adolf tobeñacultura 3.0
 

En vedette (10)

Escera el cervell
Escera el cervellEscera el cervell
Escera el cervell
 
The Art Of Indexing
The Art Of IndexingThe Art Of Indexing
The Art Of Indexing
 
Cultivating a Downtown Marketplace--Staunton, VA
Cultivating a Downtown Marketplace--Staunton, VA Cultivating a Downtown Marketplace--Staunton, VA
Cultivating a Downtown Marketplace--Staunton, VA
 
Evolution of a Main Street
Evolution of a Main StreetEvolution of a Main Street
Evolution of a Main Street
 
Evolution of a Main Street
Evolution of a Main StreetEvolution of a Main Street
Evolution of a Main Street
 
Tricider
TriciderTricider
Tricider
 
Liberating genius by Tammy Dunbar
Liberating genius by Tammy DunbarLiberating genius by Tammy Dunbar
Liberating genius by Tammy Dunbar
 
Memories of our summer vacation
 Memories of our summer vacation  Memories of our summer vacation
Memories of our summer vacation
 
Entrepreneurship in education
Entrepreneurship in educationEntrepreneurship in education
Entrepreneurship in education
 
The erotic brain by adolf tobeña
The erotic brain by adolf tobeñaThe erotic brain by adolf tobeña
The erotic brain by adolf tobeña
 

Similaire à Enforcing compliancewithpbm kensimmons

Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeThuan Ng
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
Domino Fitness. Time for a Health Check
Domino Fitness. Time for a Health CheckDomino Fitness. Time for a Health Check
Domino Fitness. Time for a Health CheckJared Roberts
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
 
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 releaseDevendra Sawant
 
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...Emtec Inc.
 
Which Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against ItWhich Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against ItJamieWilliams130
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
 
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelSalesforce Developers
 
So I DevSecOpsed Office 365
So I DevSecOpsed Office 365So I DevSecOpsed Office 365
So I DevSecOpsed Office 365Alex Mags
 

Similaire à Enforcing compliancewithpbm kensimmons (20)

IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administrat...
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Domino Fitness. Time for a Health Check
Domino Fitness. Time for a Health CheckDomino Fitness. Time for a Health Check
Domino Fitness. Time for a Health Check
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Salesforce shield & summer 20 release
Salesforce shield & summer 20 releaseSalesforce shield & summer 20 release
Salesforce shield & summer 20 release
 
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
PCI Compliance: How to Remain Compliant and Gain Near Real-Time Analytics on ...
 
Which Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against ItWhich Came First: The Phish or the Opportunity to Defend Against It
Which Came First: The Phish or the Opportunity to Defend Against It
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & AzureRencore Webinar: Myth-busting GDPR in Office 365 & Azure
Rencore Webinar: Myth-busting GDPR in Office 365 & Azure
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Fortress SQL Server
Fortress SQL ServerFortress SQL Server
Fortress SQL Server
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Introduction to the Salesforce Security Model
Introduction to the Salesforce Security ModelIntroduction to the Salesforce Security Model
Introduction to the Salesforce Security Model
 
So I DevSecOpsed Office 365
So I DevSecOpsed Office 365So I DevSecOpsed Office 365
So I DevSecOpsed Office 365
 

Enforcing compliancewithpbm kensimmons

  • 1. Enforcing Compliance With Policy-Based Management Ken Simmons, DBA
  • 2. Contact Info Blog: http://cybersql.blogspot.com/ Email: kensimmonsii@gmail.com Twitter: @KenSimmons LinkedIN: http://www.linkedin.com/in/kensimmons
  • 3. What is Compliance? “Conformity in fulfilling official requirements”* External Regulations HIPAA SOX PCI Internal Standards Naming Conventions http://www.flickr.com/photos/dunechaser/220636504/ *http://www.merriam-webster.com/dictionary/compliance
  • 4. More than 494 million records have been breached since 2005* Unintended Disclosure Payment Card Fraud Physical Loss (Non-Electronic) Insider Hacking or Malware Portable Device Loss Stationary Device Loss Why Does Compliance Matter? 474 million http://www.flickr.com/photos/bheathr/2253526798 *http://www.privacyrights.org/data-breach/
  • 5. What’s The Process? Identify Risks Develop Policies To Mitigate Risks Ensure Policies Are Being Enforced Risk Management Governance Compliance
  • 6. Policy-Based Management Can Help! Gives you the ability to define and enforce standards Auditors Love Policies It is NOT and Enterprise Edition Feature http://www.flickr.com/photos/dunechaser/489467800/
  • 7. The BIG Picture Servers CMS SQL 2008
  • 9. PBM L33T Speak Targets are objects such as a Instances, Databases, Tables, etc. Facets expose logical groupings of properties for those objects. Conditions are made up of expressions exposed by the properties from a single Facet. A Policy evaluates a Condition against one or more Targets.
  • 10. Creating Policies Export the Current State of an Object Import Predefined Policies Create Custom Policies Based on Facets Create Custom Policies using Advanced Conditions
  • 11. Evaluating Policies On Demand Can “Auto Fix” Certain Violations OnSchedule Uses SQL Agent Job On Change – Log Only Writes Violations to SQL and Windows Log On Change – Prevent Uses DDL Triggers to Rollback Changes
  • 13. Alerts Error Number by Evaluation Mode On change: prevent (automatic), 34050 On change: prevent (on demand), 34051 On schedule, 34052 On change, 34053 Prerequisites Configure Database Mail Create Operator Configure SQL Agent
  • 14.
  • 15. SAC for Database Engine 2008 FeaturesService Account Server Facet: Service Account != 'LocalSystem' Log Retention Server Facet: NumberOfLogFiles = 99
  • 16.
  • 17. SELECT COUNT(*) FROM sysloginsWHERE name = 'Builtindministrators'
  • 19. SELECT COUNT(*)FROM sysloginsWHERE name = 'sa' ANDis_disabled = 0Note: Using syslogins instead of sys.server_principals allows you to evaluate SQL 2000 Instances
  • 20. Encryption Predefined Best Practice Policies Asymmetric Key Encryption Algorithm Symmetric Key Encryption for User Databases Symmetric Key for master Database Symmetric Key for System Databases Transparent Data Encryption Database Facet: EncryptionEnabled = True Extensible Key Management Server Configuration Facet: ExtensibleKeyManagementEnabled = True
  • 21. Audit Predefined Best Practice Policies SQL Server Default Trace Login Auditing Server Audit Facet: LoginAuditLevel = All SQL Server Audit Server Facet: AuditLevel = All Audit Facet: Enabled = True & OnFailure = Shutdown Database Audit Specification Facet: Enabled = True Server Audit Specification Facet: Enabled = True
  • 22. Resources Pro SQL Server 2008 Policy-Based Management http://www.apress.com/book/view/9781430229100 MSDN Policy-Based Management Blog http://blogs.msdn.com/sqlpbm/ SQL Server 2008 Compliance Guide http://www.microsoft.com/downloads/details.aspx?FamilyId=6E1021DD-65B9-41C2-8385-438028F5ACC2&displaylang=en Deploying SQL Server 2008 Based on PCI DSS http://www.parentebeard.com/Uploads/Files/Deploying_SQL_Server_2008_Based_on_PCI_DSS.PDF