Database Security
Database Security
Database Security
Contents
1. Goal
2. Message
3. Database Security Threats
4. Control of Threats
5. Summary
Database Security
Goals
Understand security issues in:
a general database system environment
a specific DBMS (Oracle, MySQL, MSSQL)
environment
Consider database security issues in context of
general security principles and ideas
Consider issues relating to both database storage and
database system communication with other
applications
3
Database Security
Main Message
Database system security is more than securing the
database:
Secure database
Secure DBMS
Secure applications / application development
Secure operating system in relation to database
system
Secure web server in relation to database system
Secure network environment in relation to database system
Database Security
Database Security
Security
is the degree of resistance to, or protection
from, harm.
It applies to any vulnerable and valuable
asset, such as a person, dwelling,
community, nation, or organization.
6
Database Security
Definition of Database Security
concerns the use of a broad range of information security
controls to protect databases (potentially including the data, the
database applications or stored functions, the database systems, the
database servers and the associated network links) against
compromises of their confidentiality, integrity and availability.
Actual Scenario:
For example, a bank employee whose job requires the ability to
change only accountholder contact information may take advantage
of excessive database privileges and increase the account balance
of a colleagues savings account. Further, when someone leaves an
organization, often his or her access rights to sensitive data do not
change. And, if these workers depart on bad terms, they can use
their old privileges to steal high value data or inflict damage.
10
11
12
Actual Scenario:
Consider an internal healthcare application used to view
individual patient records via a custom Web interface. The Web
application normally limits users to viewing an individual patients
healthcare historymultiple patient records cannot be viewed
simultaneously and electronic copies are not allowed.
13
Actual Scenario:
However, a rogue user might be able to circumvent these restrictions
by connecting to the database using an alternative client such as MSExcel. Using Excel and their legitimate login credentials, the user
could retrieve and save all patient records to their laptop.
Once patient records reach a client machine, the data then becomes
susceptible to a wide variety of possible breach scenarios.
14
15
17
Typical Scenario:
Three-tier application (web interface, application, database)
Overall application tracks own usernames and passwords in
database (advantage: can manage users in real time)
Web interface accepts username and password, passes these to
application layer as parameters
18
20
22
23
24
25
26
27
29
31
32
34
36
38
40
41
42
44
47
48
50
51
54
55
56
57
58
59
60
61
62
63
64
70
71
Summary
72
Summary
73
References
http://en.wikipedia.org/wiki/Database_security
http://www.imperva.com/docs/WP_TopTen_Database_Threats.pdf
http://www.techopedia.com/definition/1245/structured-query-languag
e-sql
http://docs.oracle.com/cd/B19306_01/network.102/b14266/reqthret.
htm
http://en.wikipedia.org/wiki/Database
http://en.wikipedia.org/wiki/Security
74
The End
75