Database Firewall (DBF) : v14.3 Database Activity Monitoring User Guide
Database Firewall (DBF) : v14.3 Database Activity Monitoring User Guide
Provides real-time database protection against internal and external threats by alerting or blocking attacks and
abnormal access requests. SecureSphere provides virtual patching for a number of database software vulnerabilities,
reducing the window of exposure and impact of long patch cycles. DBF includes the auditing and analytics
capabilities offered by DAM.
Enables automatic aggregation and review of user access rights. SecureSphere helps identify excessive rights and
dormant users based on organizational context and actual data usage. Using URMD, organizations can demonstrate
compliance with regulations such as SOX, PCI 7, PCI 8.5 and reduce the risk of data breach.
9074 User Rights Management for Databases (URMD) Last modified: 5/23/2014 9:18:06 AM
Provides vulnerability assessment and configuration audits allowing users to measure compliance with industry
standards and best practices. Data discovery and classification enable organizations to accurately scope security and
compliance projects. With a combined analysis of sensitive data and vulnerabilities, SecureSphere helps prioritize and
better manage risk mitigation efforts.
9098 Discovery and Assessment Server (DAS) Last modified: 5/23/2014 8:46:40 AM
Delivers real-time monitoring and auditing of access to files stored on file servers and network attached storage (NAS)
devices, on the z/OS operating system.
You need to create a new license on the MX for this feature to work.
Since File Activity Monitoring for z/OS is based upon Agents, you will also need a license for Database Activity
Monitoring License for this feature to work.
62767 File Activity Monitoring for z/OS Last modified: 12/19/2016 2:40:36 PM
Database systems are complex entities, combining the core database with a collection of associated applications, all
of which must be secured against unauthorized access and tampering. The SecureSphere security model, based on
the concept of ensuring application data security, provides the framework for complete protection of the enterprise’s
prime assets: its confidential, structured data and applications.
The above figure shows the channels through which enterprise data is typically accessed and how SecureSphere
monitors and controls all of these channels. SecureSphere provides application data security for the entire enterprise
data security life cycle: visibility to who accesses the data and how it is accessed, as well as a detailed comprehensive
audit trail for forensic after-the-fact analysis. SecureSphere’s granular controls enable detection and blocking of
attacks on data, prevent data leakage to outsiders and to unauthorized internal personnel, and, for compliance
requirements, documented demonstrable evidence that the data is protected around the clock.
To provide an effective application data security solution, SecureSphere tracks all users who access the database.
SecureSphere’s data activity monitoring and real time data protection provide full visibility and granular control of
data as it passes through applications and users.
The following table describes all the possible application users who are presented in Application Data Security.
User Description
A user who connects directly to the database, using the database vendor’s
DBA/Privileged user
management tools.
Second tier application A user who accesses the database via conventional applications, for example, Visual
users Basic applications.
A user who connects to an application which in turn connects to the database, for
example, an SAP client which accesses the SAP application servers, which directly
access a SAP database.
SecureSphere tracks users along the entire path, from the application login through
the database access. Moreover, because SecureSphere uniquely monitors both HTTP
and SQL traffic, it is able to correlate front-end application users with their queries
Third tier application users
even when the front-end application user’s identity is not present in the
SecureSphere SQL/database traffic.
The SecureSphere system's protection operates in layers that correspond to the OSI 7-layer model. The firewall
corresponds to OSI layers 2 through 4. Protocol Validation and Application Layer Signatures correspond to OSI layer 7,
as shown below. Several of SecureSphere's advanced protection processes, such as Profile Evaluation, Web/DB
Correlation, and Correlated Attack Detection operate at the level of the application and thus provide protection at
what is effectively layer 8 — a layer not defined in the OSI model.
Component Description
The agent, installed on the database server, monitors local database activity,
typically by DBAs or developers working directly on the database server, whether
using a console or through an SSH session over a network. SecureSphere’s
nonintrusive, lightweight agents record database traffic and send it to a
Database Monitor Agent
SecureSphere gateway for storage and analysis.
Agents can also be used to monitor remote sites where a SecureSphere gateway
cannot be conveniently deployed.
The Database Security Gateway performs the full scope of database and application
Database Security Gateway
activity monitoring, and blocks malicious traffic.
Component Description
SecureSphere Architecture
SecureSphere enables you to create a model of your network, then uses this model to guide the discovery of services
and data, assess discovered services,and monitor activity in your database. This is achieved by creating a model of
your network in SecureSphere including the following basic elements:
• Sites: A physical site where server groups are installed (for example, data centers).
• Server Groups: A container that enables you to represent your network in a logical manner, for example you
can set up different server groups for different geographic locations. Server groups contain physical servers,
services and actual applications.
For FAM the best practice is that a Server Group represents a single storage. It may include more than one server
in a cluster, or more than one IP address of a single server., but not different File Servers.