Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Database

    Securing Enterprise Crown Jewels: How to Protect Data at DB Level

    Written by

    Chris Preimesberger
    Published January 7, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Data breaches once again played a prominent role in this past year’s media coverage. While many organizations make it seem like an unavoidable fact, the reality is that there are a plenty of things that enterprises can do right now to help prevent unauthorized access to their systems and data.

      In this eWEEK Data Points article, Maria Colgan, Master Product Manager for Oracle Database, shares with readers some best practices on how organizations can better secure their data at the database level.

      Data Point No. 1: Understand your environment – review your system configuration.

      Many data breaches occur because of simple misconfiguration errors – database settings that unintentionally elevate the risk of breach by lowering the security posture of the system. These can be as simple as inadequate password policies or as complex as poorly configured network encryption routines. Some database vendors provide tools to assess the security of their databases. For many database platforms, the Center for Internet Security (CIS) publishes benchmark checklists that can be used to assess a systems configuration. The United States Department of Defense (DOD) Defense Information Systems Agency (DISA) also offers “Secure Technical Implementation Guides” (STIG) that provide even more detail on recommendations to lock down your systems.

      Data Point No. 2: Lock the back door – encrypt all your data.

      Data is among the most valuable assets of a business, and encryption is a critical step in ensuring that it remains secure. Although many people still believe encryption has an impact on performance, the advent of cloud computing and the latest encryption technologies often means that is no longer the case. All of the major database vendors provide some form of database encryption, usually referring to the feature as something like Transparent Data Encryptionor Native Database Encryption. This type of encryption helps protects against attacks that try to circumvent the database’s access control mechanisms by preventing attackers from accessing and reading your data through the operating system, backup copies, or on the storage array, keeping the database secure from these out-of-band attacks.

      To make sure that all your sensitive data is encrypted, you should consider encrypting your entire application database. Oracle has seen several cases in which organizations have tried to encrypt just a few columns they painstakingly identified as sensitive, only to learn that sensitive data was also in several other tables and columns. Don’t get stuck in a continuous loop of analyzing which data is sensitive and just targeting those few data elements – the cost of the continuous analysis and re-implementation of encryption is outweighed by the benefit of just encrypting all of the application data.

      Data Point No. 3: Build a wall around it – Use a database firewall.

      While encryption is an excellent first step to ensure your data stays safe, another crucial step is to make sure that your database doesn’t get accessed by unauthorized parties. Properly configuring a database firewall means database activity is being monitored, pre-emptively detecting and even blocking unauthorized access, application bypass and SQL injections.

      When configuring your database firewall, you should define policies that help you easily identify anomalous activity. In most cases, database workloads are repetitive – with a well-defined group of application servers and clients using the same consistent set of programs to access the database. Different database firewall vendors offer their own unique paradigms for policy development, but almost all of them have some way to identify exceptions to normal client activity. In some cases, this profiling of normal activity can be as fine grained as identifying normal SQL activity for a database, so that the database firewall can even block SQL Injection attacks.

      Data Point No. 4: Monitor everything – audit your database.

      Auditing databases regularly is one of the best ways to minimize the risk of your data being exposed to external threats or unauthorized access. After all, one of the biggest issues in security is lack of visibility. Organizations don’t know what they don’t know, and unless regular audit processes are in place, there is no way to identify where vulnerabilities lie and where misconfigurations are leaving sensitive data unprotected.

      Remember that a network-based monitor can only see the commands that traverse the network. If your database allows direct local connections that aren’t routed over the network, the database firewall may not see them. A network-based monitor will also frequently miss SQL that is hex-encoded or that is dynamically created using your database’s procedural language.

      A good practice is to have all data definition and data control language (DDL and DCL) audited – especially changes to user profiles or privileges and creation or modification of stored procedures. If you have done the work of identifying sensitive data objects, you should also consider auditing access to those objects–especially if the access occurs outside of the normal application activity.

      Data Point No. 5: Limit what they see – define strict access rules.

      While leveraging data is crucial for many business functions across an organization, it doesn’t mean that everyone should have access to all the data. There are many ways in which an organization can restrict access to sensitive data without impacting the work of its employees. Strive to restrict your users and administrators to only the privileges required for their business function. The first step is to determine which data is needed by each business function and then set strict rules on who gets to access specific business data sets. This is one of the critical tools to help prevent internal malicious actors from misusing data.

      If your database supports it, use access control mechanisms to separate the duties of database and system administration from managing the data within the database. At a minimum, you should audit access to data by privileged users. You may be able to avoid granting the database’s default administration role–which is usually far more privileged than required for day-to-day administration–and instead create less-powerful roles that are tailored for the work an administrator performs.

      Data Point No. 6: Make it harmless – mask your data.

      Sometimes, application developers and administrators need a test environment as they build, maintain, and deploy business applications. In many cases, testing and development will require data sets that are equivalent in size and complexity to production, resulting in many organizations cloning the production database to create these lower level environments. When that happens, the security risk inherent in the production database is suddenly multiplied as there are now two (or perhaps, FIVE) copies of the data. Reduce risk by masking the data – replacing sensitive data with artificially generated or scrambled data that has no inherent sensitivity. The industry term for this is static data masking.

      There is another type of masking – dynamic data masking. Some databases provide this feature (vendors may refer to this feature as dynamic data masking, data redactionoronline data transformation). What you are looking for is the ability to change the presentation of data based upon a security policy, without modifying the underlying data. Use dynamic data masking to control the proliferation of sensitive data elements, and to reduce the chance of malicious or accidental disclosure of sensitive data elements. The difference between static and dynamic masking is that static data masking is destructive – it actually changes the data. Dynamic data masking is non-destructive, with no change made to the underlying data. For example, in most cases someone accessing a credit card number should not see the entire number – just the last four digits. This is where dynamic data masking comes into play.

      Data Point No. 7: Autonomous options for securing data.

      Given how important it is to keep up with patching, autonomous systems are a critical tool in protecting data. The vast majority (85 percent) of security breaches today attack known vulnerabilities that have available patches. Often those patches have been out for months or even years but haven’t been applied, because it is never convenient to bring a system down. Using machine learning, autonomous systems can constantly scan for threats and anomalies and apply patches automatically with minimal downtime. The emergence of self-driving, self-securing and self-repairing technologies offers organizations a smarter way to handle the avalanche of constant patching and re-patching required especially when cybersecurity talent can be scarce. By implementing autonomous technologies, IT leaders will be free to establish more comprehensive risk awareness and prevention strategies and that’s important if you want to secure the crown jewels.  

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×