Database Security
Database Security
Insider Threats
Even if you do apply patches on time, there is always the risk of zero-day attacks,
when attackers discover a vulnerability, but it has not yet been discovered and
patched by the database vendor.
Buffer overflow takes place when a process tries to write a large amount of
data to a fixed-length block of memory, more than it is permitted to hold.
Attackers might use the excess data, kept in adjacent memory addresses, as
the starting point from which to launch attacks.
Malware
An Evolving IT Environment
Let’s consider the Oracle database server. After the database is installed, the
Oracle database configuration assistant (DBCA) automatically expires and
locks most of the default database user accounts.
If you install an Oracle database manually, this doesn’t happen and default
privileged accounts won’t be expired or locked. Their password stays the
same as their username, by default. An attacker will try to use these
credentials first to connect to the database.
Irrespective of how solid your defenses are, there is always a possibility that
a hacker may infiltrate your system. Yet, attackers are not the only threat to
the security of your database. Your employees may also pose a risk to your
business. There is always the possibility that a malicious or careless insider
will gain access to a file they don’t have permission to access.
Here are several best practices you can use to improve the security of
sensitive databases.
If you have a large organization, you must think about automating access
management via password management or access management software.
This will provide permitted users with a short-term password with the rights
they need every time they need to gain access to a database.
It also keeps track of the activities completed during that time frame and
stops administrators from sharing passwords. While administrators may feel
that sharing passwords is convenient, however, doing so makes effective
database accountability and security almost impossible.
Once you have put in place your database security infrastructure, you must
test it against a real threat. Auditing or performing penetration tests against
your own database will help you get into the mindset of a cybercriminal and
isolate any vulnerabilities you may have overlooked.
In particular, File Integrity Monitoring (FIM) can help you log all actions
carried out on the database’s server and to alert you of potential breaches.
When FIM detects a change to important database files, ensure security
teams are alerted and able to investigate and respond to the threat.
You should use a firewall to protect your database server from database
security threats. By default, a firewall does not permit access to traffic. It
needs to also stop your database from starting outbound connections unless
there is a particular reason for doing so.
As well as safeguarding the database with a firewall, you must deploy a web
application firewall (WAF). This is because attacks aimed at web
applications, including SQL injection, can be used to gain illicit access to your
databases.
A database firewall will not stop most web application attacks, because
traditional firewalls operate at the network layer, while web application
layers operate at the application layer (layer 7 of the OSI model). A WAF
operates at layer 7 and is able to detect malicious web application traffic,
such as SQL injection attacks, and block it before it can harm your database