Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
Linux Geek, Opensource Enthusiast, Security Hobbies
RHCT, RHCSAv5-v7,RHCEv5-v7,RHCVA, RHCI, RHCX, RHCSA-RHOS,RHCJA,CEI, CEH,
CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017-2018
Senior Operation Manager Technology
Key-Service For Your Business
Key-Service For Your Business
What Is Database Security?
Database security, under the
umbrella of information security,
protects the confidentiality,
integrity and availability of an
organization’s databases.
Key-Service For Your Business
Importance of Database Security and Integrity
Database security is more than just important:
it is essential to any company with any online
component. Sufficient database security
prevents data bring lost or compromised,
which may have serious ramifications for the
company both in terms of finances and
reputation
Key-Service For Your Business
Biggest Data Breaches of 2018
Aadhaar (Kemendagri India)
1.1 billion records breached
Date disclosed: January 3, 2018
Facebook (sosmed)
At least 87 million records breached
Date disclosed: March 17, 2018
The Oregon Clinic (healtcare)
Records affected: 64,487
The most affected industries in 2017 (by number of breaches)
https://www.medcareernews.com/top-industries-affected-data-leaks-2017/
Key-Service For Your Business
Data Breaches of 2018 Map
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Key-Service For Your Business
Most Common Attack Vector
https://www.sophos.com/en-us/medialibrary/pdfs/other/apt-infographic.pdf?cmp=70130000001xIObAAM
Key-Service For Your Business
Enterprise Security Framework
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Database Security Conceptual View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Data Security Logical Architecture View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
The Methodology for Proven Database Security
Leverage Biznet
Manage Services
Provider
to secure cloud database
investment
Key-Service For Your Business
Inventory
• Discover, classify and prioritize the
databases containing your valuable
information whether cloud based or
on-premise
• Discover, Track and Manage Your SQL
Server Inventory
• Manage known databases on your
network and in the cloud; discover
unknown databases outside the
scope of current compliance controls
Key-Service For Your Business
Inventory
Key-Service For Your Business
Testing
• Define and manage security standards and
compliance policies to be used to assess
database security posture
• Schedule or run ad-hoc job-based
assessments to quantify cloud based or
on-premise database adherence to
selected policies
Key-Service For Your Business
Compliance and Certifications
Key-Service For Your Business
Compliance Enablement Logical Architecture
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Eliminate Vulnerabilities
• Fix potentially harmful password configurations,
table access grants, user roles and other
vulnerable areas identified in assessment of
database assets.
• Conduct regular and continuous assessments to
identify issues and ensure that they are
remediated in a timely manner.
Key-Service For Your Business
Enforce Least Privileges
• Ensure employees and applications
have only the rights needed to do
their jobs
• Understand who has access to what
data and how they’ve been granted
that access
Key Point:
Analyze membership to powerful server roles and groups such as administrators, systems administrators, and
security administrators to ensure the level of access is warranted. From a group, see the list of group members
and select a member for further analysis. From a user, see the group memberships and drill upwards to view
inherited permissions.
Key-Service For Your Business
Monitor for Anomalies
• Inspect database access and activities
for policy violations and attempted
attacks
• Audit actions of known privileged
users as well as administrative activity
Key-Service For Your Business
Fraud Detection Logical Architecture View
Source: Oracle Security In Depth Reference Architecture
Key-Service For Your Business
Protecting
• Deploy policy-based Activity Monitoring to create an easily managed set of
actionable security and compliance alerts.
• Transparent Data Encryption (TDE) to protect sensitive data
• Database Firewall acts as the first line of defense for databases, helping prevent
internal and external attacks from reaching the database
Key-Service For Your Business
DR / Backup Plan - Multiple Data Center
Cloud Provider providing Multi Region Provide higher Avaibility to Database
Key-Service For Your Business
No Bandwidth Hassle
Key-Service For Your Business
Respond to Incident
Audit and Respond to suspicious activity and policy violations in real time
• Send an alert to IT Security to prompt further investigation.
• Notify the SIEM system to correlate database activity with web application logs.
• Initiate a malware scan to remove any injected code.
• Lockout the user’s account to prevent further attempts to access sensitive data.
Key-Service For Your Business
Peace of Mind
Key-Service For Your Business
Question and Answer
Key-Service For Your Business
Key-Service
For Your Business
www.biznetgiocloud.com
PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia

More Related Content

PDF
Biznet Gio Presentation - Cloud Computing
PDF
Protecting National Critical Infrastructure Asiangames 2018
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
Workshop on CASB Part 2
PDF
ECS: Delivering Better Cyber Intelligence and Compliance
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PPTX
Security and governance in the cloud
PPTX
Security As A Service In Cloud(SECaaS)
Biznet Gio Presentation - Cloud Computing
Protecting National Critical Infrastructure Asiangames 2018
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Workshop on CASB Part 2
ECS: Delivering Better Cyber Intelligence and Compliance
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Security and governance in the cloud
Security As A Service In Cloud(SECaaS)

What's hot (19)

PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PDF
63 Requirements for CASB
PDF
Take It to the Cloud: The Evolution of Security Architecture
PDF
CSA Introduction 2013 David Ross
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
Thin Air or Solid Ground? Practical Cloud Security
PDF
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
PDF
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
PPTX
Rethinking Cybersecurity for the Digital Transformation Era
PDF
CSA Standards Development Summary
PPTX
The evolution of IT in a cloud world
PPTX
Secure your M365 resources using Azure AD Identity Governance
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PDF
Implementing zero trust architecture in azure hybrid cloud
PDF
Using Data Science for Cybersecurity
PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
PDF
CASB — Your new best friend for safe cloud adoption?
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
63 Requirements for CASB
Take It to the Cloud: The Evolution of Security Architecture
CSA Introduction 2013 David Ross
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Thin Air or Solid Ground? Practical Cloud Security
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Rethinking Cybersecurity for the Digital Transformation Era
CSA Standards Development Summary
The evolution of IT in a cloud world
Secure your M365 resources using Azure AD Identity Governance
Secure your cloud applications by building solid foundations with enterprise ...
Implementing zero trust architecture in azure hybrid cloud
Using Data Science for Cybersecurity
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
CASB — Your new best friend for safe cloud adoption?
NIST Cybersecurity Framework (CSF) on the Public Cloud
Ad

Similar to Biznet Gio Presentation - Database Security (20)

PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PDF
Ppt security-database-overview-11g r2
PPTX
Security of the Cloud of the users Computing 2.pptx
PPTX
basic to advance network security concepts
PPTX
Database Security Assessment | Database Security Assessment Services
PDF
Oracle 11g database security
PDF
Wp security-data-safe
PPTX
Oracle 11g security - 2014
PPTX
Oracle database threats - LAOUC Webinar
PDF
Best Practices in Implementing Oracle Database Security Products
PDF
Enabling digital transformation with MySQL
PDF
MySQL Day Paris 2016 - MySQL Enterprise Edition
PDF
MySQL Manchester TT - Security
PPTX
Working of Google App Engine Cloud Computing.pptx
PDF
Tänased võimalused turvalahendustes - Tarvi Tara
PDF
Modern Data Security with MySQL
PDF
security in database management system.
PDF
Presentation topic for Philippines SAP user group forum
PDF
Ethernautics, Inc - Database Cyber Security Threats
Best Practices for implementing Database Security Comprehensive Database Secu...
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Ppt security-database-overview-11g r2
Security of the Cloud of the users Computing 2.pptx
basic to advance network security concepts
Database Security Assessment | Database Security Assessment Services
Oracle 11g database security
Wp security-data-safe
Oracle 11g security - 2014
Oracle database threats - LAOUC Webinar
Best Practices in Implementing Oracle Database Security Products
Enabling digital transformation with MySQL
MySQL Day Paris 2016 - MySQL Enterprise Edition
MySQL Manchester TT - Security
Working of Google App Engine Cloud Computing.pptx
Tänased võimalused turvalahendustes - Tarvi Tara
Modern Data Security with MySQL
security in database management system.
Presentation topic for Philippines SAP user group forum
Ethernautics, Inc - Database Cyber Security Threats
Ad

More from Yusuf Hadiwinata Sutandar (20)

PDF
Varnish Enterprise Feature​ Migration From Varnish Cache​
PDF
Presentasi_Yusuf_Hadiwinata_Sutandar_PANDI_Berdaulat_Digital.pdf
PDF
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
PDF
How DevOps works in the Enterprise
PDF
Acronis Meet and Learn
PDF
BiznetGio Presentation Business Continuity
PDF
March of the Penguin - 31 years Linux Snapshot
PDF
Choose the Right Container Storage for Kubernetes
PDF
Biznet GIO National Seminar on Digital Forensics
PDF
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
PDF
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
PDF
Devops Indonesia Presentation Monitoring Framework
PDF
Bssn book security awarness
PDF
Job vacancies cti group
PDF
Devops Indonesia - DevSecOps - The Open Source Way
PDF
Devops indonesia - The Future Container
PDF
Journey to the devops automation with docker kubernetes and openshift
PDF
War of Openstack Private Cloud Distribution
PDF
create auto scale jboss cluster with openshift
PDF
Docker handons-workshop-for-charity
Varnish Enterprise Feature​ Migration From Varnish Cache​
Presentasi_Yusuf_Hadiwinata_Sutandar_PANDI_Berdaulat_Digital.pdf
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
How DevOps works in the Enterprise
Acronis Meet and Learn
BiznetGio Presentation Business Continuity
March of the Penguin - 31 years Linux Snapshot
Choose the Right Container Storage for Kubernetes
Biznet GIO National Seminar on Digital Forensics
PHPIDOL#80: Kubernetes 101 for PHP Developer. Yusuf Hadiwinata - VP Operation...
Kubernetes Jakarta Meetup 010 - Service Mesh Observability with Kiali
Devops Indonesia Presentation Monitoring Framework
Bssn book security awarness
Job vacancies cti group
Devops Indonesia - DevSecOps - The Open Source Way
Devops indonesia - The Future Container
Journey to the devops automation with docker kubernetes and openshift
War of Openstack Private Cloud Distribution
create auto scale jboss cluster with openshift
Docker handons-workshop-for-charity

Recently uploaded (20)

PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Internet of Everything -Basic concepts details
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Microsoft User Copilot Training Slide Deck
DOCX
Basics of Cloud Computing - Cloud Ecosystem
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
NewMind AI Weekly Chronicles – August ’25 Week IV
Build Your First AI Agent with UiPath.pptx
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
sustainability-14-14877-v2.pddhzftheheeeee
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Internet of Everything -Basic concepts details
Auditboard EB SOX Playbook 2023 edition.
sbt 2.0: go big (Scala Days 2025 edition)
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
search engine optimization ppt fir known well about this
Advancing precision in air quality forecasting through machine learning integ...
Lung cancer patients survival prediction using outlier detection and optimize...
Co-training pseudo-labeling for text classification with support vector machi...
giants, standing on the shoulders of - by Daniel Stenberg
Data Virtualization in Action: Scaling APIs and Apps with FME
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Microsoft User Copilot Training Slide Deck
Basics of Cloud Computing - Cloud Ecosystem

Biznet Gio Presentation - Database Security

  • 2. Yusuf Hadiwinata Sutandar Linux Geek, Opensource Enthusiast, Security Hobbies RHCT, RHCSAv5-v7,RHCEv5-v7,RHCVA, RHCI, RHCX, RHCSA-RHOS,RHCJA,CEI, CEH, CHFI, CND, EDRP, CCNA, MCTCNA, Security+, Network+, VCA, vExpert 2017-2018 Senior Operation Manager Technology
  • 4. Key-Service For Your Business What Is Database Security? Database security, under the umbrella of information security, protects the confidentiality, integrity and availability of an organization’s databases.
  • 5. Key-Service For Your Business Importance of Database Security and Integrity Database security is more than just important: it is essential to any company with any online component. Sufficient database security prevents data bring lost or compromised, which may have serious ramifications for the company both in terms of finances and reputation
  • 6. Key-Service For Your Business Biggest Data Breaches of 2018 Aadhaar (Kemendagri India) 1.1 billion records breached Date disclosed: January 3, 2018 Facebook (sosmed) At least 87 million records breached Date disclosed: March 17, 2018 The Oregon Clinic (healtcare) Records affected: 64,487 The most affected industries in 2017 (by number of breaches) https://www.medcareernews.com/top-industries-affected-data-leaks-2017/
  • 7. Key-Service For Your Business Data Breaches of 2018 Map http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 8. Key-Service For Your Business Most Common Attack Vector https://www.sophos.com/en-us/medialibrary/pdfs/other/apt-infographic.pdf?cmp=70130000001xIObAAM
  • 9. Key-Service For Your Business Enterprise Security Framework Source: Oracle Security In Depth Reference Architecture
  • 10. Key-Service For Your Business Database Security Conceptual View Source: Oracle Security In Depth Reference Architecture
  • 11. Key-Service For Your Business Data Security Logical Architecture View Source: Oracle Security In Depth Reference Architecture
  • 12. Key-Service For Your Business The Methodology for Proven Database Security Leverage Biznet Manage Services Provider to secure cloud database investment
  • 13. Key-Service For Your Business Inventory • Discover, classify and prioritize the databases containing your valuable information whether cloud based or on-premise • Discover, Track and Manage Your SQL Server Inventory • Manage known databases on your network and in the cloud; discover unknown databases outside the scope of current compliance controls
  • 14. Key-Service For Your Business Inventory
  • 15. Key-Service For Your Business Testing • Define and manage security standards and compliance policies to be used to assess database security posture • Schedule or run ad-hoc job-based assessments to quantify cloud based or on-premise database adherence to selected policies
  • 16. Key-Service For Your Business Compliance and Certifications
  • 17. Key-Service For Your Business Compliance Enablement Logical Architecture Source: Oracle Security In Depth Reference Architecture
  • 18. Key-Service For Your Business Eliminate Vulnerabilities • Fix potentially harmful password configurations, table access grants, user roles and other vulnerable areas identified in assessment of database assets. • Conduct regular and continuous assessments to identify issues and ensure that they are remediated in a timely manner.
  • 19. Key-Service For Your Business Enforce Least Privileges • Ensure employees and applications have only the rights needed to do their jobs • Understand who has access to what data and how they’ve been granted that access Key Point: Analyze membership to powerful server roles and groups such as administrators, systems administrators, and security administrators to ensure the level of access is warranted. From a group, see the list of group members and select a member for further analysis. From a user, see the group memberships and drill upwards to view inherited permissions.
  • 20. Key-Service For Your Business Monitor for Anomalies • Inspect database access and activities for policy violations and attempted attacks • Audit actions of known privileged users as well as administrative activity
  • 21. Key-Service For Your Business Fraud Detection Logical Architecture View Source: Oracle Security In Depth Reference Architecture
  • 22. Key-Service For Your Business Protecting • Deploy policy-based Activity Monitoring to create an easily managed set of actionable security and compliance alerts. • Transparent Data Encryption (TDE) to protect sensitive data • Database Firewall acts as the first line of defense for databases, helping prevent internal and external attacks from reaching the database
  • 23. Key-Service For Your Business DR / Backup Plan - Multiple Data Center Cloud Provider providing Multi Region Provide higher Avaibility to Database
  • 24. Key-Service For Your Business No Bandwidth Hassle
  • 25. Key-Service For Your Business Respond to Incident Audit and Respond to suspicious activity and policy violations in real time • Send an alert to IT Security to prompt further investigation. • Notify the SIEM system to correlate database activity with web application logs. • Initiate a malware scan to remove any injected code. • Lockout the user’s account to prevent further attempts to access sensitive data.
  • 26. Key-Service For Your Business Peace of Mind
  • 27. Key-Service For Your Business Question and Answer
  • 28. Key-Service For Your Business Key-Service For Your Business www.biznetgiocloud.com PT. Biznet Gio Nusantara MidPlaza 1, 7th Floor Jl. Jend Sudirman Kav. 10-11 Jakarta 10220 – Indonesia