How to Monitor and Protect Your Databases
The need to preserve the confidentiality and integrity of data and to monitor privileged user activity is driving organizations to reconsider their strategy for database security, and to impose stringent controls across database systems. It's critical to maintain database security review processes and stay up-to-date with patches and controls. Because compliance demands it and customers expect it, Knowledge Center contributor Dominique Levin explains how you can best monitor and protect your databases.With the database market valued at more than $20 billion, and the amount of sensitive information stored growing rapidly, it is little wonder that databases are a huge target for security attacks today. After all, they contain customer credit card information, financial data and intellectual property as bait. Some extremely large and sophisticated predators are willing and able to crack open the database for illegal and malicious purposes. You might even consider databases as storing the corporate crown jewels or the lifeblood of an enterprise. In many organizations, privileged database access is granted excessively and managed poorly. Developers, mobile workers and external consultants often have access to sensitive information without much restriction. In addition, personnel turnover and outsourcing can make database activities more difficult to lock down.
Though databases are subject to most compliance requirements-including the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA) and the Federal Information Security Management Act of 2002 (FISMA)-it's not always easy to meet compliance objectives, and compliance isn't always a top priority.