Sunday, September 26, 2010

Top Five Reasons Database Security Fails In The Enterprise

Independent Oracle Users Group survey reveals common database security missteps made by enterprises
Sep 24, 2010 | 02:27 PM
By Ericka Chickowski, Contributing Writer
DarkReading
Though database security best practices have circulated the conference circuit for years now and existing database security tools are now mature, today’s typical enterprise is still far behind in shoring up its most sensitive stores of data. In fact, the Independent Oracle Users Group’s (IOUG) recently released data security survey findings are enough to open the eyes of anyone who has ever read news reports about embarrassing data breaches and wondered if his company could be breached next time.
Taking a look at the results, it’s clear that most organizations today are still running database security by the seats of their pants. The vast majority of organizations do not monitor their databases at all, or do so in an ad hoc fashion. Even more troubling, most enterprises don’t even know where their sensitive data resides — with many administrators admitting in the survey that they are not sure of all of the databases that contain sensitive information.
Based on IOUG’s survey of 430 of its members conducted by Unisphere Research, we’ve identified some of the biggest reasons why breach statistics remain so high. Until organizations get these practices under control, embarrassing data security slips will continue to make the news.
1. Organizations still don’t know where sensitive data resides. 
Before an enterprise can protect its sensitive data, it has to know where it is. Unfortunately, in today’s fast-paced IT environments many administrators are finding it difficult to track sensitive information across numerous databases.
The plain truth is they just don’t know which databases contain data such as personally identifiable information (PII) and which do not. The survey found that 48 percent of respondents admitted they were not aware of all of the databases in the organization that contain sensitive information.
Part of the difficulty is the sheer number of databases that organizations run these days. About 35 percent of organizations run between 11 and 100 databases, nearly 40 percent run more than 100 databases, and 13 percent of organizations run more than 1,000 databases.
Further complicating matters is the fact that so much sensitive information creeps outside of production databases. About 37 percent of organizations admitted they use live production data in nonproduction databases. Among those who do, 39 percent said this data contains PII or they weren’t sure.
2. Security monitoring remains spotty. 
With so many databases to track, organizations must be systematic about how they monitor activity on these data stores if they want to truly gain visibility into who is accessing what information. Yet only one in four organizations have automated tools to monitor database activity on a regular basis, a statistic that has remained largely unchanged since IOUG began surveying database administrators back in 2008.
IOUG found also that while 72 percent of organizations use native auditing tools on at least some of their databases, very few of the administrators actually look at the data generated by these tools. About 11 percent of organizations said they manually monitor databases on a regular basis.
Unsurprisingly, 25 percent of organizations said they have no way to detect whether unauthorized changes are made to the database. Just 30 percent of organizations reported they would be able to detect such changes on most databases. Approximately 46 percent of respondents said they’d be able to detect unauthorized changes on some databases.
However, among those who can detect changes, the response time is slow. Just 12 percent said they’d be able to detect unauthorized changes within an hour, while about 33 percent reported that it would take them up to a day. Approximately 16 percent said it would take them a day or longer, and nearly 40 percent were not sure how long it would take to respond to an unauthorized database change.
3. Privileged users run unchecked. 
One of the IOUG survey respondents said, “Our greatest risk is probably that of a rogue employee running amok. We’d know about it soon enough, but it might be too late to avoid serious damage.”
This is a common opinion among many administrators; approximately 22 percent of respondents listed internal hackers as their biggest database security risk, and another 12 percent said abuse of privileges was their highest threat.
Yet in spite of this awareness, organizations are doing very little to mitigate these risks. A whopping three-quarters of organizations do not have or aren’t sure if they have a means to prevent privileged users from tampering with or compromising database information. Only about 23 percent of organizations have a way to safeguard from accidental changes by privileged users. And within a quarter of organizations, even regular users can bypass applications to gain direct access to data using ad hoc tools.
Perhaps more disconcerting is the fact that many companies also fail to protect audit data from unauthorized access and tampering. About 57 percent of respondents do not consolidate database audit data to a central secure location, making it possible for privileged users to change audit data to cover their tracks after making unauthorized access or changes.
4. Database patches are deployed slowly. 
Many of today’s nastiest breaches occur at the hands of hackers who take advantage of database and Web application vulnerabilities to break into sensitive data stores. According to the recent Verizon 2010 Data Breach Investigations Report, 90 percent of last year’s breaches involved SQL injection attacks.
While enterprises could do a lot to take the edge off the risks from these attacks by keeping their databases patched and configured securely, they are simply not taking advantage of this opportunity to mitigate the threat. The IOUG survey found that 63 percent of administrators admit they are at least a cycle late with their critical patch updates. Of most concern are the 17 percent of administrators who say they don’t apply patches at all or are unsure when patches are applied.
5. Encryption practices lag. 
Even with regulations such as HIPAA and PCI DSS in place that require organizations to encrypt or deidentify PII within databases, database encryption of PII within the typical organization remains woefully deficient. Less than a third of administrators said they encrypt PII within all of their databases, while 38 percent said they do not encrypt PII or are unsure of whether they do. The numbers for encryption of network traffic to and from the database are about the same, with about 23 percent of organizations reporting they encrypt all database traffic, and 35 percent admitting that they do not encrypt this traffic or are not sure whether such traffic is encrypted.
The real Achilles heel of database encryption is how database backups and copies of databases sent to off-site partners are treated. Fewer than half of organizations can definitively say they do not send unencrypted database information off-site. And just 16 percent of organizations said they encrypt all database backups and exports.

Monday, September 20, 2010

InfoSphere Guardium Database Activity Monitor

InfoSphere™ Guardium® Database Activity Monitor provides continuous monitoring to high-value databases and automating compliance controls in across heterogeneous enterprises.
InfoSphere Guardium Database Activity Monitor is the most simple, robust and widely-used database activity monitor solution. It prevents unauthorized activities by privileged insiders or hackers to identify potential fraud, all without impacting performance.

InfoSphere Guardium Enterprise Integrator

InfoSphere™ Guardium® Enterprise Integrator retrieves from external databases or text files and integrate the data into the Guardium repository for audit completeness.
Many enterprises rely on manual processes to gather the data needed to ensure that database security policies contain accurate and meaningful data. Automating security and compliance operations relieve organizations of the pressure resulting from escalating workloads and complex environments.

InfoSphere Guardium Configuration Audit System for Database Servers

InfoSphere™ Guardium® Configuration Audit System tracks changes to external database objects that affect security. A library of best practices templates speeds deployment.
Databases are installed at the operating system level, utilizing system services. As a result, many configuration elements that can affect security are difficult to identify and monitor. Configuration Audit System tracks and reports all changes made to these elements to the central console.

InfoSphere Guardium Data-Level Access Control

InfoSphere™ Guardium® Data-Level Access Control monitors all database connections, blocking unauthorized activities to sensitive data based on granular, real‐time policies.
Most organizations struggle with enforcing database controls, especially against privileged users that have unrestricted rights. Native DBMS controls are ineffective against privileged users, and newer technologies like database activity monitoring can only detect unauthorized access and changes.

InfoSphere Guardium Entitlement Reports

InfoSphere™ Guardium® Entitlement Reports aggregate database entitlements across the enterprise, including those granted through roles and groups.
With the explosion in data growth, it has become difficult to ensure that database privileges and system rights are appropriately protected. The Entitlement Reports module scans your infrastructure to automatically collect information on user rights, without time-consuming manual processes.

InfoSphere Guardium Database Vulnerability Assessment

InfoSphere™ Guardium’s® Database Vulnerability Assessment solution scans database infrastructures to detect vulnerabilities and makes recommendations to strengthen security.
The solution enables organizations to eliminate the enormous risk created by misconfigured and unpatched databases, providing:

InfoSphere Guardium Advanced Compliance Workflow Automation

InfoSphere™ Guardium® Advanced Compliance Workflow Automation centralizes and streamlines compliance oversight enterprise-wide, while providing complete management visibility.
Organizations typically manage compliance workflow processes manually. As a result, operational costs are high, and audit exceptions resulting from process break-downs occur frequently. Workflow automation streamlines oversight processes and ensures timely completion of tasks.

Prevent Database Leaks

Most information leaks, even those that occur via stolen laptops or emailing sensitive information, originate with unauthorized or unusual queries to critical databases. Organizations typically have formal access policies that govern how and when sensitive data is accessed, but lack practical solutions for detecting or blocking activities that fall outside these policies. As a result, many organizations experience leakage of valuable information such as credit card data, customer records and employee personally identifiable information (PII).
Unlike Data Leak Prevention (DLP) solutions that watch data as it leaves the network perimeter via email or USB devices, InfoSphere Guardium’s leak prevention solution addresses leakage at the source—in the data center itself—using three essential technologies supported across database platforms from eight vendors:

Enforce Database Change Control

To protection mission critical systems, most organizations have formal change control policies that govern how and when employees and contractors can make changes to production databases. However detecting violations is difficult, making the policies hard to enforce.
Detecting unauthorized database changes is also important from an external security perspective, as they can be an indicator that a database has been compromised, since hackers often make database changes in the process of extracting data or embedding malware.
With the InfoSphere Guardium solution, you can receive real-time security alerts whenever important changes are made. Our system:

Audit and Validate Compliance with PCI DSS, SOX and Data Privacy Laws

Organizations are subject to a growing number of regulatory mandates to protect sensitive information such financial records and personally identifiable information (PII). These mandates require mechanisms but put in place to detect, record, and remediate unauthorized access or changes to sensitive data, including those by privileged users. IBM’s InfoSphere Guardium provides a simple means of automating and centralizing compliance controls, even in geographically dispersed multi-vendor environments. It reduces compliance costs by providing:
InfoSphere Guardium is used by over 400 organizations world-wide to automate the controls associated with a variety of mandates including:

Monitor Enterprise Application Users for Fraud

Many organizations rely on enterprise applications to execute core business processes and manage significant amounts of data which are both mission critical and highly sensitive. Financial data, personnel data and customer data are all examples of information managed by applications like SAP and Oracle EBS. It is therefore not surprising that compliance requirements and audits often involve data managed by enterprise applications.
Multi-tier enterprise applications are difficult to secure for a variety of reasons. They are designed to be easily accessible via web, making them susceptible to attack. They also typically mask the identity of application end-users at the database transaction level, using an optimization mechanism known as “connection pooling”. Connection pooling identifies all transactions with a generic service account name, making it challenging to associate specific transactions with particular end-users. As a result, fraudulent transactions are difficult to trace. Last of all the data associated with enterprise applications can also be accessed directly by privileged users via developer tools like SQL *Plus, bypassing controls within the application.
Infosphere Guardium is a comprehensive data protection and compliance solution that addresses all of these issues, providing:

Monitor Privileged Users

Most organizations have formal policies that govern how and when privileged users—such as DBAs, developers and outsourced personnel—can access database systems. However they have not had effective mechanisms for monitoring, controlling, and auditing their actions.
Privileged users have unfettered access to corporate databases, enabling them to read sensitive data, modify database structures and grant new database rights. As a result, hackers typically seek to elevate their privileges once they have compromised a system; often successfully. To make matters worse, accountability is difficult to achieve because privileged users often share the credentials used to access database systems.
Internal and external auditors are now demanding monitoring of privileged users for security best practices, as well as to comply with a wide range of regulatory mandates.
The InfoSphere Guardium solution provides powerful capabilities for identifying, recording and blocking inappropriate actions by superusers:

Preventing Cyberattacks with Database Activity Monitoring

Most organizations, irrespective of industry or geography, are subject to repeated attacks by hackers seeking to acquire their valuable data. IBM’s Database Activity Monitoring (DAM) technology helps prevent outsider attacks such as SQL injection in several ways, all of which can be used simultaneously to provide a layered defense. This is accomplished by creating and enforcing real-time, proactive policies such as:
IBM’s InfoSphere Guardium solution allows you to easily create real-time policies across the database and file sharing platforms of eight major vendors. Responses to policy violations are fully customizable, with options ranging from real-time transaction blocking to real-time alerts or user quarantine.
InfoSphere Guardium has been deployed by over 400 customers globally, protecting infrastructures ranging from small clusters to tens of thousands of databases.

What is Real-Time Database Activity Monitoring

IBM InfoSphere Guardium provides the simplest, most robust solution for assuring the privacy and integrity of trusted information in your data center (SAP, PeopleSoft, Cognos, Siebel, etc.) and reducing costs by automating the entire compliance auditing process in heterogeneous environments.