Page 189 - DCAP508_DATABASE_ADMINISTRATION
P. 189

Unit 13: Monitoring Database Modifications




          sophisticated intra-database attacks will not be detected. To capture local access some network  Notes
          based vendors deploy a probe that runs on the host. This probe intercepts all local access and can
          also intercept all networked access in case you do not want to use network gear or in case the
          database communications are encrypted. However, since the agent does not do all the processing
          — instead it relays the data to the DAM appliance where all the processing occurs — it may
          impact network performance with all of the local traffic and real-time session termination may
          be too slow to interrupt unauthorized queries.
          Memory-based: Some DAM systems have a light weight sensor that attaches to the protected
          databases and continuously polls the system global area (SGA) to collect SQL statements as they
          are being performed. A similar architecture was previously used by performance optimization
          products that also used the SGA and other shared data structures.




             Did u know? In the latest versions of this technology a light weight sensor runs on the host
             and attaches to the process at the OS level to inspect private data structures.
          The advantages of this approach are significant:

               Complete coverage of all database transactions — the sensor covers traffic coming from
               the network, from the host, as well as from back-doors (stored procedures, triggers,
               views)
               A solution that is agnostic to most IT infrastructure variables - no need to re-architect the
               network, to open span ports or to worry about key management if the network is encrypted,
               and this model can also be used to protect databases deployed in virtualized environments
               or in the cloud

          Log-based: Some DAM systems analyze and extract the information from the transaction logs
          (e.g., the redo logs). These systems use the fact that much of the data is stored within the redo
          logs and they scrape these logs. Unfortunately, not all of the information that is required is in
          the redo logs. For example, SELECT statements are not and so these systems will augment the
          data that they gather from the redo logs with data that they collect from the native audit trails as
          shown in Figure 3. These systems are a hybrid between a true DAM system (that is fully
          independent from the DBMS) and a SIEM which relies on data generated by the database. These
          architectures usually imply more overhead on the database server.

          13.6 User Benefits

          The user benefits can be quantified as:

          1.   Monitoring
               i.   Privileged users monitoring: DBAs, root, system admins – which have access to access
                    and alter data either via the application either by logging in at the system OS or
                    local console. Their access has to be monitored in order to prevent privileged users
                    from accessing data, making modifications to schema or table structure, or creating
                    or modifying user accounts or permissions
               ii.  User activity monitoring: In order to track the users and the applications that connect
                    to the database. Beside fraud access, an important aspect is also to monitor and
                    eventually prevent also malicious or unintended activity of the legitimate users.
               iii.  If possible, also the user accounts have to be constantly monitored in order to detect
                    the dormant user accounts, and take appropriate action.





                                           LOVELY PROFESSIONAL UNIVERSITY                                   183
   184   185   186   187   188   189   190   191   192   193   194