Page 190 - DCAP508_DATABASE_ADMINISTRATION
P. 190

Database Administration




                    Notes          2.  Risk and Compliance: the risk and security teams are seeking to implement tight controls
                                       around the data stores in order ensure data confidentiality and integrity while limiting
                                       access to privileged users and subsequently identifying fraudulent activities. The preventive
                                       security solutions and controls such as encryption and access management, are not effective
                                       for authorized/legitimate user access. Thus, the DAM solution can be successfully deployed
                                       in order to fulfill the security controls required by:
                                       i.   Data Governance

                                       ii.  Risk Management
                                       iii.  Audit
                                       iv.  Regulatory Compliance.
                                       The benefits provided by the DAM solution, via a tight integration with DLP and SIEM
                                       solutions respectively, allow the extension of the network controls and the security
                                       framework also to the databases and data stores.

                                   3.  Policy Enforcement: Database Firewall includes a complete set of predefined, customizable
                                       security and audit policies. Security alerts can be sent to SIEM, ticketing systems, and other
                                       third-party solutions to streamline business processes.

                                   Business Impact

                                   The solutions can be deployed offpath either inline. In order to comprehensively monitor and
                                   detect fraudulent activity, a solution must monitor all the “gateways” to the data store. Thus, the
                                   employment of software agents in order to monitor also the local activity (server console or
                                   other applications connecting to the database) is to be taken into consideration.
                                   If the solutions are deployed offpath, then there is no impact on the monitored network
                                   segments.
                                   If the solutions are to be deployed inline in protect mode (database firewall), then several
                                   considerations are to be taken into account:
                                       Usually the solution is deployed in transparent mode, with no IP addressing on the traffic
                                       interfaces. Thus, the DAM should have fail-open functionalities in order to allow the
                                       traffic to pass through in case of platform malfunction
                                       Minimum latency – the latency induced in the network has to be minimum

                                       The enforcement of the security policies is to be done in stages – first deployed non-intrusively,
                                       and upon successful testing only the security policies are to be enforced in place.
                                       Proper performance dimensioning in order to withstand peak traffic, in terms of both
                                       legitimate and malicious traffic; if the device cannot operate properly under heavy load
                                       this will have a direct impact on the business process

                                       Access policies have to be reviewed each time a modification has to be operated to the
                                       application, at both the application and at user access policies; failing to do this can result
                                       in blocking legitimate traffic and/or blocking legitimate users’ access.

                                       Data audit – when turned on, it consumes very severely the resources – thus, a powerful
                                       enough hardware appliances has to be deployed.










          184                               LOVELY PROFESSIONAL UNIVERSITY
   185   186   187   188   189   190   191   192   193   194   195