DBA Database Security
DBA Database Security
Database Security
Last updated: March 31, 2022
What Does Database Security Mean?
Database security refers to the collective measures used to protect and
secure a database or database management software from illegitimate use
and malicious cyber threats and attacks.
Database security procedures are aimed at protecting not just the data
inside the database, but the database management system and all the
applications that access it from intrusion, misuse of data, and damage.
Advertisement
Techopedia Explains Database Security
Database security covers and enforces security on all aspects and
components of databases. This includes:
Database security is a complex and challenging endeavor that involves all aspects of
information security technologies and practices. It’s also naturally at odds with database
usability. The more accessible and usable the database, the more vulnerable it is to
security threats; the more invulnerable the database is to threats, the more difficult it is
to access and use. (This paradox is sometimes referred to as Anderson’s Rule. (link
resides outside IBM)
Why is it important
By definition, a data breach is a failure to maintain the confidentiality of data in a
database. How much harm a data breach inflicts on your enterprise depends on a
number of consequences or factors:
Insider threats
An insider threat is a security threat from any one of three sources with privileged
access to the database:
Insider threats are among the most common causes of database security breaches and
are often the result of allowing too many employees to hold privileged user access
credentials.
Human error
Accidents, weak passwords, password sharing, and other unwise or uninformed user
behaviors continue to be the cause of nearly half (49%) of all reported data breaches.
Exploitation of database software vulnerabilities
Hackers make their living by finding and targeting vulnerabilities in all kinds of software,
including database management software. All major commercial database software
vendors and open source database management platforms issue regular security
patches to address these vulnerabilities, but failure to apply these patches in a timely
fashion can increase your exposure.
Buffer overflow occurs when a process attempts to write more data to a fixed-length
block of memory than it is allowed to hold. Attackers may use the excess data, stored in
adjacent memory addresses, as a foundation from which to launch attacks.
In a denial of service (DoS) attack, the attacker deluges the target server—in this case
the database server—with so many requests that the server can no longer fulfill
legitimate requests from actual users, and, in many cases, the server becomes unstable
or crashes.
In a distributed denial of service attack (DDoS), the deluge comes from multiple servers,
making it more difficult to stop the attack. See our video “What is a DDoS Attack”(3:51)
for more information:
Malware
Attacks on backups
Organizations that fail to protect backup data with the same stringent controls used to
protect the database itself can be vulnerable to attacks on backups.
Growing data volumes: Data capture, storage, and processing continues to grow
exponentially across nearly all organizations. Any data security tools or practices need
to be highly scalable to meet near and distant future needs.
Infrastructure sprawl: Network environments are becoming increasingly complex,
particularly as businesses move workloads to multicloud or hybrid cloud architectures,
making the choice, deployment, and management of security solutions ever more
challenging.
Increasingly stringent regulatory requirements: The worldwide regulatory
compliance landscape continues to grow in complexity, making adhering to all
mandates more difficult.
Cybersecurity skills shortage: Experts predict there may be as many as 8 million
unfilled cybersecurity positions by 2022 .
Best practices
Because databases are nearly always network-accessible, any security threat to any
component within or portion of the network infrastructure is also a threat to the
database, and any attack impacting a user’s device or workstation can threaten the
database. Thus, database security must extend far beyond the confines of the database
alone.
When evaluating database security in your environment to decide on your team’s top
priorities, consider each of the following areas:
Database security policies should be integrated with and support your overall business
goals, such as protection of critical intellectual property and your cybersecurity
policies and cloud security policies. Ensure you have designated responsibility for
maintaining and auditing security controls within your organization and that your policies
complement those of your cloud provider in shared responsibility agreements. Security
controls, security awareness training and education programs, and penetration testing
and vulnerability assessment strategies should all be established in support of your
formal security policies.
Discovery: Look for a tool that can scan for and classify vulnerabilities across all your
databases—whether they’re hosted in the cloud or on-premise—and offer
recommendations for remediating any vulnerabilities identified. Discovery capabilities
are often required to conform to regulatory compliance mandates.
Data activity monitoring: The solution should be able to monitor and audit all data
activities across all databases, regardless of whether your deployment is on-premise,
in the cloud, or in a container. It should alert you to suspicious activities in real-time so
that you can respond to threats more quickly. You’ll also want a solution that can
enforce rules, policies, and separation of duties and that offers visibility into the status
of your data through a comprehensive and unified user interface. Make sure that any
solution you choose can generate the reports you’ll need to meet compliance
requirements.
Encryption and tokenization capabilities: In case of a breach, encryption offers a
final line of defense against compromise. Any tool you choose should include flexible
encryption capabilities that can safeguard data in on-premise, cloud, hybrid, or
multicloud environments. Look for a tool with file, volume, and application encryption
capabilities that conform to your industry’s compliance requirements, which may
demand tokenization (data masking) or advanced security key management
capabilities.
Data security optimization and risk analysis: A tool that can generate contextual
insights by combining data security information with advanced analytics will enable you
to accomplish optimization, risk analysis, and reporting with ease. Choose a solution
that can retain and synthesize large quantities of historical and recent data about the
status and security of your databases, and look for one that offers data exploration,
auditing, and reporting capabilities through a comprehensive but user-friendly self-
service dashboard.