© 2021 IDERA, Inc. All rights reserved.
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing 2021
Tracking who did what to which data when –
on-prem and in the cloud
A webinar by Craig S. Mullins
www.mullinsconsutling.com
1
© 2021 Mullins Consulting, Inc. All rights reserved.
This presentation was prepared by:
Craig S. Mullins
President & Principal Consultant
IBM Champion for Analytics
IBM Gold Consultant
Mullins Consulting, Inc.
15 Coventry Ct
Sugar Land, TX 77479
Tel: 281-494-6153
E-mail: craig@craigsmullins.com
http://www.mullinsconsulting.com
This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document
contains information that is proprietary and confidential to Mullins Consulting, Inc., which shall not be disclosed outside or
duplicated, used, or disclosed in whole or in part for any purpose other than as approved by Mullins Consulting, Inc. Any use or
disclosure in whole or in part of this information without the express written permission of Mullins Consulting, Inc. is prohibited.
© 2016 Craig S. Mullins and Mullins Consulting, Inc. (Unpublished). All rights reserved.
© 2021 Mullins Consulting, Inc. All rights reserved.
Data Breach Issues
• Trends and considerations
• Cost of a data breach
• Your database is a target!
Dealing with Data Protection
• Government and Industry Regulations
• Compliance and Requirements
Database Auditing
• Who are the stakeholders
• Types of database auditing
• Database auditing methods
© 2021 Mullins Consulting, Inc. All rights reserved.
Data Breach Issues
Data Loss Facts and Trends
© 2021 Mullins Consulting, Inc. All rights reserved.
Privacy Rights Clearinghouse is one source for tracking data breaches:
Since February 2005…
• There have been 9,015 data breach incidents impacting over 10 billion total records
containing sensitive personal information were exposed due to data security
breaches*
• That averages out to almost 12 data breaches every week
• Starting with ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached
Another good source is the annual Verizon Data Breach Investigations
Report…
• According to the Verizon Data Breach Report, in 2020 there were 5,258 confirmed
data breaches, across 88 different countries.
https://privacyrights.org/data-breaches
* As of September 7, 2019, reported by Privacy Rights Clearinghouse
Data Breaches are Common
© 2021 Mullins Consulting, Inc. All rights reserved.
Source: 2018 Gemalto Breach Level Index
https://breachlevelindex.com/
Frequency of Data Breaches
© 2021 Mullins Consulting, Inc. All rights reserved.
• Data breaches impact customer loyalty
• 64% of consumers are unlikely to do business with companies
where their sensitive data was stolen
• Companies bear the responsibility to protect customer data,
according to:
• Governmental and industry regulations
• But also customers: 69% of whom believe companies are most
responsible for protecting customer data
• Customers do not believe that companies take this responsibility to
protect their data as seriously as they should:
• 75% of consumers believe that companies do not take
protection and security of their data seriously
Source: 2015 Gemalto Breach Level Index http://bit.ly/1PUCspY
The Negative Impact of Data Breaches
© 2021 Mullins Consulting, Inc. All rights reserved.
The average cost of a
data breach (in 2018)
was up to $3.86 million
This is a 6.4% increase
from 2017
Source: Ponemon Institute 2018 Cost of a Data Breach Study: United States
• Regulatory Fines and Legal Judgments
• Legal Defense Costs
• Customer Notifications
• Credit Monitoring
• Forensic Analysis
• Reputational Losses
The Cost of a Data Breach
© 2021 Mullins Consulting, Inc. All rights reserved.
The cost of a data breach actually varies
• Average loss for a breach of 1,000 records:
• Between $52,000 and $87,000
• Average loss for a breach affecting 10 million records:
• Between $2.1 million and $5.2 million
Source: 2015 Verizon Data Breach Investigation Report
© 2021 Mullins Consulting, Inc. All rights reserved.
Your Database Systems are Targets for Attack
Enterprise database servers are a
significant target of data breach attacks
• Because that is where the data is!
• Personally identifiable information (PII)
• Such as SSN, address, etc.
• Personal financial data
• Bank account/credit card information
• Healthcare data
• Etc.
© 2021 Mullins Consulting, Inc. All rights reserved.
Source: 2015 Verizon Data Breach Investigation Report
Frequency of Database Attacks
© 2021 Mullins Consulting, Inc. All rights reserved.
Dealing With Data Protection Issues
Regulations and Governance
© 2021 Mullins Consulting, Inc. All rights reserved.
Sample Regulations Impacting Data Protection
Governance Privacy
1. Basel II
2. Sarbanes Oxley
3. Turnbull Report
4. OFAC
5. CMS ARS
1. PCI DSS
2. HIPAA
3. CA SB 1386/AB 1950
4. GLBA
5. FCRA -- “Red Flag”
6. FISMA
7. GDPR
Protect and control the process Protect the data
© 2021 Mullins Consulting, Inc. All rights reserved.
https://privacyrights.org/resources/data-breach-notification-united-states-and-territories
US State and Territory Regulations
As of 2018, all 50 states have enacted data breach notification
statutes.
The exact requirements of these regulations can vary greatly.
Considerations include:
▪ Definition of a breach
▪ Type and form of data to be protected (electronic, digital, paper, etc.)
▪ Encryption key breach specifications
▪ Type and amount of penalty to be imposed for violations
▪ Entities covered (person, partnership, coporation, sole proprietor, government,
etc.)
▪ Notification obligation and method
© 2021 Mullins Consulting, Inc. All rights reserved.
These resources can help to guide your compliance efforts:
▪ COBIT - https://cobitonline.isaca.org/
Control Objectives for Information and Related Technology
▪ Center for Internet Security (CIS) - https://www.cisecurity.org/
Organization dedicated to enhancing the cybersecurity readiness and response
among public and private sector entities
▪ Department of Defense (DoD) - http://www.defense.gov/Resources/DoD-Information-
Quality-Guidelines
Guidelines and procedures for information quality
▪ Security Technical Implementation Guide (STIG) -
http://iase.disa.mil/stigs/Pages/index.aspx
Technical guidance for securely locking down computer systems & software that
otherwise might be vulnerable to attacks
▪ Common Vulnerability Exposure (CVE) - https://cve.mitre.org/
Dictionary of publicly known information security vulnerabilities and exposures
Guidance for Regulatory Compliance
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing by Regulation
Audit Requirement SOX PCI-DSS GLB HIPAA Basel II GDPR
Access to sensitive data
(SELECT)
X X X X X
Modification of sensitive
data
(INSERT, UPDATE,
DELETE)
X X X
Database changes/DDL
(CREATE, ALTER, DROP)
X X X X X X
Security authorizations/DCL
(GRANT, REVOKE)
X X X X X X
Security exceptions
(e.g. failed logins, SQL
errors)
X X X X X X
© 2021 Mullins Consulting, Inc. All rights reserved.
Monitoring privileged users is a significant aspect of compliance
auditing… From a database perspective this includes:
• DBAs
• SYSADMs
• SECADMs
Not enough of
this is being
done…
Source: Cyberthreat Defense Report, CyberEdge Group
Privileged User Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing
What is it?
How is it done?
© 2021 Mullins Consulting, Inc. All rights reserved.
There are many names used for basically the same thing.
In this presentation the term database auditing is used, but
you may also know it as:
• Data Access Auditing
• Data Monitoring
• Database Activity Monitoring (DAM)
My definition of Database Auditing:
The process of monitoring access to and modification
of selected database objects and resources within
operational databases and retaining a detailed record of the
access where this record can be used to proactively trigger
actions and can be retrieved and analyzed as needed.
What is Database Auditing?
© 2021 Mullins Consulting, Inc. All rights reserved.
Database Auditing Key Stakeholders
SECURITY
OPERATIONS
✓ Real-time policies
✓ Secure audit trail
✓ Data mining &
forensics
✓ Business rqmts
✓ Separation of
duties
✓ Best practices
reports
✓ Automated controls
✓ Minimal impact
✓ Change management
✓ Performance
issues
© 2021 Mullins Consulting, Inc. All rights reserved.
Authorization Auditing
• Who can do what
Access Auditing
• Who did do what.
• Modifications: INSERT, UPDATE, DELETE
• Reads: SELECT
• DDL: CREATE, DROP, ALTER
• DCL: GRANT, REVOKE
• Utilities: Load, Unload, Export, Import, Copy…
Replication Auditing
• Who copied which data where.
Types of Database Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Non-Standard Access
• File-level snooping as opposed to going through the DBMS
interface
• System-level snooping and zapping (e.g. pointers)
• Image copy backup data sets
• Unload data sets
• REORG data sets
• Database statistics
• Some database statistics, such as column distribution statistics,
can contain actual data values
• Such as AMASPZAP on mainframes
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieab100/iea3b1_AMASPZAP.htm
© 2021 Mullins Consulting, Inc. All rights reserved.
Selective
• Must be rules-based to enable the capture of audit details only on the
specific data that requires auditing.
• Should be able to implement privileged user auditing, auditing by
application, by database object, by type of command, by utility, etc.
Comprehensive
• Must be able to capture the complete scenario of auditable
information.
Non-invasive
• Should be able to audit access to data without incurring expensive
performance degradation.
Be capable of answering:
• Who accessed/modified the data?
• When did it happen?
• Using what computer program or client software?
• From what location on the network?
• What was the SQL query that accessed the data?
• Was it successful; and if so, how many rows of data were retrieved?
General Database Auditing Requirements
© 2021 Mullins Consulting, Inc. All rights reserved.
There are 6 common methods used to audit databases:
1. Audit within the DBMS (traces)
Must start a trace w/I the DBMS/server
2. Audit using temporal capabilities
SYSTEM temporal tables to record all changed data
3. Audit using triggers (or hand-coding)
Database triggers or hard-coding audit trail in programs
4. Audit from the database transaction log files
Modifications are on the log anyway so…
5. Audit over the network
Sometimes called network sniffing: captures SQL requests
as they are sent over the network
6. Audit directly against the DBMS server control blocks
Sometimes called a “tap”
Database Auditing Approaches
© 2021 Mullins Consulting, Inc. All rights reserved.
Most DBMSes offer an audit or trace capability that enables you
to trace events or categories of events by UserID, object
ownership, etc.
You can typically choose from multiple audit options such as:
• Categories of events
• SELECT, INSERT, UPDATE, DELETE, CREATE, DROP,
REVOKE, GRANT, etc.
• Privileged User Access
• Specific Tables, UserIDs, programs…
1. Native DBMS Audit Capabilities
© 2021 Mullins Consulting, Inc. All rights reserved.
Potential Native Audit Issues:
Separation of duties – auditing typically is turned on and
off by DBAs (privileged users)
Overhead – some audit traces can consume a significant
amount of resources
• Don’t want to “dim the lights” to audit
Comprehensive capture – may not capture everything
that needs to be captured for compliance
First read/write in a UOR
Statements with syntax errors
Depends on the DBMS and the type of auditing
There can be multiple types of native audit per DBMS
Audit trail access – how do you access the audit trail;
may require significant programming + support
1. Native DBMS Audit Capabilities
© 2021 Mullins Consulting, Inc. All rights reserved.
A somewhat newer capability of several DBMS offerings is
the ability to create temporal tables
A system-level temporal table can be used to audit changes
(aka transaction time)
• System time tracks the insertion and modification history of the data.
• System Time is typically tracked using two tables.
2. System Temporal Tables
• One table contains the current data.
• Another, history table, contains the non-current data.
© 2021 Mullins Consulting, Inc. All rights reserved.
• Implementing auditing using SYSTEM time temporal tables…
• Typically requires a 3 step process:
1. Create the base table and include TIMESTAMP columns to track the
starting and ending points for the system time period
2. Create the history table with an identical structure, preferably by using a
CREATE TABLE . . . LIKE statement.
3. ALTER the current table to enable versioning thereby turning on the system
temporal capability.
2. System Temporal Tables
© 2021 Mullins Consulting, Inc. All rights reserved.
2. Temporal: Adding Data to our System Time “Table”
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31
600 INTRO TO JAVA 2 250.00 2012-01-10 9999-12-31
650 ADVANCED JAVA 3 400.00 2012-01-10 9999-12-31
COURSE table
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
COURSE_HIST table
The table contains three rows
The table is empty
– After inserting
these three rows →
– The data look like this
© 2021 Mullins Consulting, Inc. All rights reserved.
– After issuing these
statements (UPDATE
and DELETE) →
– Our tables now look like this
2. And then let’s DELETE from our System Time “Table”
COURSE table
COURSE_HIST table
The table contains two rows
The table contains two rows
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31
650 ADVANCED JAVA 3 375.00 2012-01-15 9999-12-31
COURSENO TITLE CREDITS PRICE SYS_START SYS_END
650 ADVANCED JAVA 3 400.00 2012-01-10 2012-01-15
600 INTRO TO JAVA 2 250.00 2012-01-10 2012-02-05
© 2021 Mullins Consulting, Inc. All rights reserved.
• Simply retrieve the current info for Advanced Java course:
• Access info about Advanced Java course for January 16, 2012:
2. System Time: Sample Queries (#1, #2)
– Returns one row →
AS OF
FROM
BETWEEN
© 2021 Mullins Consulting, Inc. All rights reserved.
• Only useful to track modifications (U/I/D)
• No tracking of access to data (read/SELECT)
• No tracking of who made each change
• No way to audit privileged users
• Data management issues
• Large amount of “old” data
• Needs to be purged – but within the specifications of the
regulations being complied with!
• Uses the database itself to store audit data
• Separation of duties: a DBA can get past it
• Disconnect the temporal connection
• Delete data
• Reconnect
2. Issues w/Using Temporal for Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
3. Using Triggers
Similar to the temporal option, you can use database
Triggers to write audit records
Write a set of Triggers for the tables you wish to audit
• One each for Insert, Update, and Delete
Write the pertinent details – whatever you want – to audit
tables you define
• Or files if your DBMS allows
triggers to write to files
© 2021 Mullins Consulting, Inc. All rights reserved.
• You have to write and maintain the Triggers
• This can be an exposure based on who has access to the trigger code
• No tracking of access to data (read/SELECT)
• No way to audit privileged users
• Trigger performance can be poor
• Data management issues similar to temporal data
• e.g.) amount of data, purging, using the database to store audit data,
separation of duties
3. Issues w/Using Triggers for Auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Sometimes developers add “audit columns” to tables, such as
LAST_MODIFIED_DATE
• The idea here is for the program to auto-
matically change the LAST_MODIFIED_DATE
column in the programs whenever data is changed
• Every program?
Auditors don’t like this… it is a problem because:
• Audit trails should be kept outside of the database
• Can you guarantee that LAST_MODIFIED_DATE is accurate?
3½. Hand-coding audit trails?
• If you delete the row you lose the audit data
• Couldn’t someone have set it by accident (or nefariously)?
© 2021 Mullins Consulting, Inc. All rights reserved.
4. What About Using the Database Logs?
Database transaction log(s) capture ALL*
changes
made to data.
DBMS
Transaction
Log(s)
SQL
Changes
*Well, maybe not all changes, all the time.
Database
© 2021 Mullins Consulting, Inc. All rights reserved.
4. Issues With Database Log Auditing & Analysis
Log format is proprietary
Volume can be an issue
Easy access to online and archive logs?
• But how long do you keep your archive logs?
Dual usage of data could cause problems?
• Recovery and protection
• Audit
Tracks database modifications, but what about reads?
• Transaction logs do not record information about SELECT
And what about non-logged operations?
• LOAD LOG NO, REORG LOG NO
• Non-logged table spaces, LOBs
Cannot invoke real-time actions using log-based auditing
© 2021 Mullins Consulting, Inc. All rights reserved.
Database auditing via network sniffing captures SQL requests
as they go across the network
• Some third-party database auditing solutions use this approach
• Perhaps more effective for cloud database auditing
But not all requests go across the wire
• DBA access directly on the server
• Mainframe applications (CICS, IMS/TM, TSO, batch)
5. Network Capture
© 2021 Mullins Consulting, Inc. All rights reserved.
Audit database requests at the server
Capture all SQL requests at the server
All SQL access can be audited, not just those made over a network
Retain all pertinent audited information
• Without relying on the DBMS
No need to keep the active/archive log files
No need to start a DBMS trace
No need to modify the database schema
Concerns?
• Requires purchasing additional ISV software
• Interfaces with DBMS internals
6. Tap Database Server Control Blocks
© 2021 Mullins Consulting, Inc. All rights reserved.
The Best Approach?
All of the approaches discussed herein have their merits
depending upon the type of database applications that you
need to audit
Database auditing products may use one or more of these
different approaches and methods
• Understand the methods used by any product you
evaluate
• For example, a combination of native tracing and
capturing information from database control blocks
can make for a reasonable solution
© 2021 Mullins Consulting, Inc. All rights reserved.
Let’s Discuss a Few Cloud Issues
When the database exists in the cloud, remotely instead of on prem,
there may be challenges that need to be understood and managed:
• If the database is managed completely by the CSP, there may be
a lack of visibility and control
• It may be difficult to integrate cloud and on-prem audit activities
• Be aware of volume and licensing issues
Finally, if you rely on the cloud, make sure that any database
auditing product you acquire will work with your cloud provider
• and DBMS
Things can get complex…
© 2021 Mullins Consulting, Inc. All rights reserved.
Benefits of Database Auditing Products
• Favor products that offer built-in reporting for the regulations
you need to comply with (like GDPR, HIPAA, etc.)
Instead of you having to translate trace records to specific
compliance requirements
• Vendor maintenance and support for changing DBMS
capabilities and regulatory compliance specifications
• Customizable policies and alerting
• Typically come with a dashboard to view compliance
information, audit activities and issues
• Built-in support for specific regulations
• Many product consume fewer resources than alternate
approaches
© 2021 Mullins Consulting, Inc. All rights reserved.
Craig S. Mullins
Mullins Consulting, Inc.
15 Coventry Ct
Sugar Land, TX 77479
(281) 494-6153
E-mail: craig@craigsmullins.com
Web: www.mullinsconsulting.com
https://datatechnologytoday.wordpress.com/
Data & Technology Today Blog
http://www.mullinsconsulting.com/dba-corner.html
DBA Corner Columns
Contact Information
https://tinyurl.com/cj3x4tm6

More Related Content

PPTX
Achieve More with Less Resources | IDERA
PPTX
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
PPTX
Benefits of Third Party Tools for MySQL | IDERA
PDF
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
PPTX
Database administrators (dbas) face increasing pressure to monitor databases
PPTX
Monitor cloud database with SQL Diagnostic Manager for SQL Server
PDF
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
PPTX
IDERA Live | Databases Don't Build and Populate Themselves
Achieve More with Less Resources | IDERA
How Users of a Performance Monitoring Tool Can Benefit from an Inventory Mana...
Benefits of Third Party Tools for MySQL | IDERA
MongoDB .local Houston 2019: Halliburton Integrated Well Construction – Edge ...
Database administrators (dbas) face increasing pressure to monitor databases
Monitor cloud database with SQL Diagnostic Manager for SQL Server
Idera live 2021: Will Data Vault add Value to Your Data Warehouse? 3 Signs th...
IDERA Live | Databases Don't Build and Populate Themselves

What's hot (20)

PDF
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
PPTX
Snowflake: The Good, the Bad, and the Ugly
PDF
Company report xinglian
PPTX
SysAid Presentation V.7
PPTX
Master the Multi-Clustered Data Warehouse - Snowflake
PPTX
Final report presentation
PDF
Rise of the Data Cloud
PPTX
RecordService for Unified Access Control
PPTX
Unlocking the Power of the Data Lake
PDF
Horses for Courses: Database Roundtable
PDF
IDERA Slides: Managing the Transition to Hybrid Cloud
PPTX
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
PPTX
Hadoop and Manufacturing
PPT
Hadoop India Summit, Feb 2011 - Informatica
PPTX
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
PPTX
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
PPTX
Data Sharing with Snowflake
PPTX
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
PPTX
SnapLogic Cloud Integration
PDF
Data Migration to Azure
Idera live 2021: Keynote Presentation The Future of Data is The Data Cloud b...
Snowflake: The Good, the Bad, and the Ugly
Company report xinglian
SysAid Presentation V.7
Master the Multi-Clustered Data Warehouse - Snowflake
Final report presentation
Rise of the Data Cloud
RecordService for Unified Access Control
Unlocking the Power of the Data Lake
Horses for Courses: Database Roundtable
IDERA Slides: Managing the Transition to Hybrid Cloud
Data Modeling for Data Science: Simplify Your Workload with Complex Types in ...
Hadoop and Manufacturing
Hadoop India Summit, Feb 2011 - Informatica
Cloudera Federal Forum 2014: The Building Blocks of the Enterprise Data Hub
DataStax on Azure: Deploying an industry-leading data platform for cloud apps...
Data Sharing with Snowflake
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
SnapLogic Cloud Integration
Data Migration to Azure
Ad

Similar to Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig Mullins (20)

PPTX
How Vulnerable is Your Critical Data?
PDF
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
PPT
Breaking down the cyber security framework closing critical it security gaps
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPSX
Shield db data security
PPSX
Shield db data security
PPSX
Shield db data security
PPT
Database auditing essentials
PPT
Data security in the cloud
PDF
Ethernautics, Inc - Database Cyber Security Threats
PDF
Michael Josephs
PPTX
Data protection and privacy in the world of database DevOps
PDF
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
PDF
Asset Security
PDF
Data security in a big data environment sweden
PDF
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
PDF
5 Steps to Securing Your Company's Crown Jewels
PPTX
Strategic Enterprise Risk and Data Architecture
PDF
The value of big data analytics
PPTX
The Three Pitfalls of Data Security
How Vulnerable is Your Critical Data?
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Breaking down the cyber security framework closing critical it security gaps
Improve IT Security and Compliance with Mainframe Data in Splunk
Shield db data security
Shield db data security
Shield db data security
Database auditing essentials
Data security in the cloud
Ethernautics, Inc - Database Cyber Security Threats
Michael Josephs
Data protection and privacy in the world of database DevOps
Rethinking Data Protection Strategies 1st Edition by Aberdeen group
Asset Security
Data security in a big data environment sweden
A P/C Insurance Data Modernization Journey Featuring Pekin Insurance, ValueMo...
5 Steps to Securing Your Company's Crown Jewels
Strategic Enterprise Risk and Data Architecture
The value of big data analytics
The Three Pitfalls of Data Security
Ad

More from IDERA Software (20)

PPTX
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
PPTX
Problems and solutions for migrating databases to the cloud
PPTX
Public cloud uses and limitations
PPTX
Optimize the performance, cost, and value of databases.pptx
PPTX
Six tips for cutting sql server licensing costs
PDF
Idera live 2021: The Power of Abstraction by Steve Hoberman
PDF
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
PDF
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
PDF
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
PDF
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
PPTX
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
PPTX
Benefits of SQL Server 2017 and 2019 | IDERA
PPTX
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
PPTX
Advanced SQL Server Performance Tuning | IDERA
PDF
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
PDF
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
PDF
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
PDF
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
PPTX
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
PDF
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...
The role of the database administrator (DBA) in 2020: Changes, challenges, an...
Problems and solutions for migrating databases to the cloud
Public cloud uses and limitations
Optimize the performance, cost, and value of databases.pptx
Six tips for cutting sql server licensing costs
Idera live 2021: The Power of Abstraction by Steve Hoberman
Idera live 2021: Why Data Lakes are Critical for AI, ML, and IoT By Brian Flug
Idera live 2021: Managing Digital Transformation on a Budget by Bert Scalzo
Idera live 2021: Managing Databases in the Cloud - the First Step, a Succes...
Idera live 2021: Performance Tuning Azure SQL Database by Monica Rathbun
Geek Sync | How to Be the DBA When You Don't Have a DBA - Eric Cobb | IDERA
Benefits of SQL Server 2017 and 2019 | IDERA
Be Proactive: A Good DBA Goes Looking for Signs of Trouble | IDERA
Advanced SQL Server Performance Tuning | IDERA
Geek Sync | Planning a SQL Server to Azure Migration in 2021 - Brent Ozar
Geek Sync | Performance Tuning: Getting the Biggest Bang for Your Buck - Moni...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | How to Think Like the SQL ServerEngine - Brent Ozar
Geek Sync | Data Integrity Demystified - Deborah Melkin | IDERA
Geek Sync | Breaking Bad Habits: Solutions for Common Query Antipatterns - Je...

Recently uploaded (20)

PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Getting Started with Data Integration: FME Form 101
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
The various Industrial Revolutions .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Five Habits of High-Impact Board Members
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A review of recent deep learning applications in wood surface defect identifi...
O2C Customer Invoices to Receipt V15A.pptx
Unlock new opportunities with location data.pdf
Getting started with AI Agents and Multi-Agent Systems
Benefits of Physical activity for teenagers.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DP Operators-handbook-extract for the Mautical Institute
Getting Started with Data Integration: FME Form 101
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
observCloud-Native Containerability and monitoring.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
The various Industrial Revolutions .pptx
Group 1 Presentation -Planning and Decision Making .pptx
Five Habits of High-Impact Board Members
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
A review of recent deep learning applications in wood surface defect identifi...

Idera live 2021: Database Auditing - on-Premises and in the Cloud by Craig Mullins

  • 1. © 2021 IDERA, Inc. All rights reserved. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing 2021 Tracking who did what to which data when – on-prem and in the cloud A webinar by Craig S. Mullins www.mullinsconsutling.com 1
  • 2. © 2021 Mullins Consulting, Inc. All rights reserved. This presentation was prepared by: Craig S. Mullins President & Principal Consultant IBM Champion for Analytics IBM Gold Consultant Mullins Consulting, Inc. 15 Coventry Ct Sugar Land, TX 77479 Tel: 281-494-6153 E-mail: [email protected] http://www.mullinsconsulting.com This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document contains information that is proprietary and confidential to Mullins Consulting, Inc., which shall not be disclosed outside or duplicated, used, or disclosed in whole or in part for any purpose other than as approved by Mullins Consulting, Inc. Any use or disclosure in whole or in part of this information without the express written permission of Mullins Consulting, Inc. is prohibited. © 2016 Craig S. Mullins and Mullins Consulting, Inc. (Unpublished). All rights reserved.
  • 3. © 2021 Mullins Consulting, Inc. All rights reserved. Data Breach Issues • Trends and considerations • Cost of a data breach • Your database is a target! Dealing with Data Protection • Government and Industry Regulations • Compliance and Requirements Database Auditing • Who are the stakeholders • Types of database auditing • Database auditing methods
  • 4. © 2021 Mullins Consulting, Inc. All rights reserved. Data Breach Issues Data Loss Facts and Trends
  • 5. © 2021 Mullins Consulting, Inc. All rights reserved. Privacy Rights Clearinghouse is one source for tracking data breaches: Since February 2005… • There have been 9,015 data breach incidents impacting over 10 billion total records containing sensitive personal information were exposed due to data security breaches* • That averages out to almost 12 data breaches every week • Starting with ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached Another good source is the annual Verizon Data Breach Investigations Report… • According to the Verizon Data Breach Report, in 2020 there were 5,258 confirmed data breaches, across 88 different countries. https://privacyrights.org/data-breaches * As of September 7, 2019, reported by Privacy Rights Clearinghouse Data Breaches are Common
  • 6. © 2021 Mullins Consulting, Inc. All rights reserved. Source: 2018 Gemalto Breach Level Index https://breachlevelindex.com/ Frequency of Data Breaches
  • 7. © 2021 Mullins Consulting, Inc. All rights reserved. • Data breaches impact customer loyalty • 64% of consumers are unlikely to do business with companies where their sensitive data was stolen • Companies bear the responsibility to protect customer data, according to: • Governmental and industry regulations • But also customers: 69% of whom believe companies are most responsible for protecting customer data • Customers do not believe that companies take this responsibility to protect their data as seriously as they should: • 75% of consumers believe that companies do not take protection and security of their data seriously Source: 2015 Gemalto Breach Level Index http://bit.ly/1PUCspY The Negative Impact of Data Breaches
  • 8. © 2021 Mullins Consulting, Inc. All rights reserved. The average cost of a data breach (in 2018) was up to $3.86 million This is a 6.4% increase from 2017 Source: Ponemon Institute 2018 Cost of a Data Breach Study: United States • Regulatory Fines and Legal Judgments • Legal Defense Costs • Customer Notifications • Credit Monitoring • Forensic Analysis • Reputational Losses The Cost of a Data Breach
  • 9. © 2021 Mullins Consulting, Inc. All rights reserved. The cost of a data breach actually varies • Average loss for a breach of 1,000 records: • Between $52,000 and $87,000 • Average loss for a breach affecting 10 million records: • Between $2.1 million and $5.2 million Source: 2015 Verizon Data Breach Investigation Report
  • 10. © 2021 Mullins Consulting, Inc. All rights reserved. Your Database Systems are Targets for Attack Enterprise database servers are a significant target of data breach attacks • Because that is where the data is! • Personally identifiable information (PII) • Such as SSN, address, etc. • Personal financial data • Bank account/credit card information • Healthcare data • Etc.
  • 11. © 2021 Mullins Consulting, Inc. All rights reserved. Source: 2015 Verizon Data Breach Investigation Report Frequency of Database Attacks
  • 12. © 2021 Mullins Consulting, Inc. All rights reserved. Dealing With Data Protection Issues Regulations and Governance
  • 13. © 2021 Mullins Consulting, Inc. All rights reserved. Sample Regulations Impacting Data Protection Governance Privacy 1. Basel II 2. Sarbanes Oxley 3. Turnbull Report 4. OFAC 5. CMS ARS 1. PCI DSS 2. HIPAA 3. CA SB 1386/AB 1950 4. GLBA 5. FCRA -- “Red Flag” 6. FISMA 7. GDPR Protect and control the process Protect the data
  • 14. © 2021 Mullins Consulting, Inc. All rights reserved. https://privacyrights.org/resources/data-breach-notification-united-states-and-territories US State and Territory Regulations As of 2018, all 50 states have enacted data breach notification statutes. The exact requirements of these regulations can vary greatly. Considerations include: ▪ Definition of a breach ▪ Type and form of data to be protected (electronic, digital, paper, etc.) ▪ Encryption key breach specifications ▪ Type and amount of penalty to be imposed for violations ▪ Entities covered (person, partnership, coporation, sole proprietor, government, etc.) ▪ Notification obligation and method
  • 15. © 2021 Mullins Consulting, Inc. All rights reserved. These resources can help to guide your compliance efforts: ▪ COBIT - https://cobitonline.isaca.org/ Control Objectives for Information and Related Technology ▪ Center for Internet Security (CIS) - https://www.cisecurity.org/ Organization dedicated to enhancing the cybersecurity readiness and response among public and private sector entities ▪ Department of Defense (DoD) - http://www.defense.gov/Resources/DoD-Information- Quality-Guidelines Guidelines and procedures for information quality ▪ Security Technical Implementation Guide (STIG) - http://iase.disa.mil/stigs/Pages/index.aspx Technical guidance for securely locking down computer systems & software that otherwise might be vulnerable to attacks ▪ Common Vulnerability Exposure (CVE) - https://cve.mitre.org/ Dictionary of publicly known information security vulnerabilities and exposures Guidance for Regulatory Compliance
  • 16. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing by Regulation Audit Requirement SOX PCI-DSS GLB HIPAA Basel II GDPR Access to sensitive data (SELECT) X X X X X Modification of sensitive data (INSERT, UPDATE, DELETE) X X X Database changes/DDL (CREATE, ALTER, DROP) X X X X X X Security authorizations/DCL (GRANT, REVOKE) X X X X X X Security exceptions (e.g. failed logins, SQL errors) X X X X X X
  • 17. © 2021 Mullins Consulting, Inc. All rights reserved. Monitoring privileged users is a significant aspect of compliance auditing… From a database perspective this includes: • DBAs • SYSADMs • SECADMs Not enough of this is being done… Source: Cyberthreat Defense Report, CyberEdge Group Privileged User Auditing
  • 18. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing What is it? How is it done?
  • 19. © 2021 Mullins Consulting, Inc. All rights reserved. There are many names used for basically the same thing. In this presentation the term database auditing is used, but you may also know it as: • Data Access Auditing • Data Monitoring • Database Activity Monitoring (DAM) My definition of Database Auditing: The process of monitoring access to and modification of selected database objects and resources within operational databases and retaining a detailed record of the access where this record can be used to proactively trigger actions and can be retrieved and analyzed as needed. What is Database Auditing?
  • 20. © 2021 Mullins Consulting, Inc. All rights reserved. Database Auditing Key Stakeholders SECURITY OPERATIONS ✓ Real-time policies ✓ Secure audit trail ✓ Data mining & forensics ✓ Business rqmts ✓ Separation of duties ✓ Best practices reports ✓ Automated controls ✓ Minimal impact ✓ Change management ✓ Performance issues
  • 21. © 2021 Mullins Consulting, Inc. All rights reserved. Authorization Auditing • Who can do what Access Auditing • Who did do what. • Modifications: INSERT, UPDATE, DELETE • Reads: SELECT • DDL: CREATE, DROP, ALTER • DCL: GRANT, REVOKE • Utilities: Load, Unload, Export, Import, Copy… Replication Auditing • Who copied which data where. Types of Database Auditing
  • 22. © 2021 Mullins Consulting, Inc. All rights reserved. Non-Standard Access • File-level snooping as opposed to going through the DBMS interface • System-level snooping and zapping (e.g. pointers) • Image copy backup data sets • Unload data sets • REORG data sets • Database statistics • Some database statistics, such as column distribution statistics, can contain actual data values • Such as AMASPZAP on mainframes https://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieab100/iea3b1_AMASPZAP.htm
  • 23. © 2021 Mullins Consulting, Inc. All rights reserved. Selective • Must be rules-based to enable the capture of audit details only on the specific data that requires auditing. • Should be able to implement privileged user auditing, auditing by application, by database object, by type of command, by utility, etc. Comprehensive • Must be able to capture the complete scenario of auditable information. Non-invasive • Should be able to audit access to data without incurring expensive performance degradation. Be capable of answering: • Who accessed/modified the data? • When did it happen? • Using what computer program or client software? • From what location on the network? • What was the SQL query that accessed the data? • Was it successful; and if so, how many rows of data were retrieved? General Database Auditing Requirements
  • 24. © 2021 Mullins Consulting, Inc. All rights reserved. There are 6 common methods used to audit databases: 1. Audit within the DBMS (traces) Must start a trace w/I the DBMS/server 2. Audit using temporal capabilities SYSTEM temporal tables to record all changed data 3. Audit using triggers (or hand-coding) Database triggers or hard-coding audit trail in programs 4. Audit from the database transaction log files Modifications are on the log anyway so… 5. Audit over the network Sometimes called network sniffing: captures SQL requests as they are sent over the network 6. Audit directly against the DBMS server control blocks Sometimes called a “tap” Database Auditing Approaches
  • 25. © 2021 Mullins Consulting, Inc. All rights reserved. Most DBMSes offer an audit or trace capability that enables you to trace events or categories of events by UserID, object ownership, etc. You can typically choose from multiple audit options such as: • Categories of events • SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, REVOKE, GRANT, etc. • Privileged User Access • Specific Tables, UserIDs, programs… 1. Native DBMS Audit Capabilities
  • 26. © 2021 Mullins Consulting, Inc. All rights reserved. Potential Native Audit Issues: Separation of duties – auditing typically is turned on and off by DBAs (privileged users) Overhead – some audit traces can consume a significant amount of resources • Don’t want to “dim the lights” to audit Comprehensive capture – may not capture everything that needs to be captured for compliance First read/write in a UOR Statements with syntax errors Depends on the DBMS and the type of auditing There can be multiple types of native audit per DBMS Audit trail access – how do you access the audit trail; may require significant programming + support 1. Native DBMS Audit Capabilities
  • 27. © 2021 Mullins Consulting, Inc. All rights reserved. A somewhat newer capability of several DBMS offerings is the ability to create temporal tables A system-level temporal table can be used to audit changes (aka transaction time) • System time tracks the insertion and modification history of the data. • System Time is typically tracked using two tables. 2. System Temporal Tables • One table contains the current data. • Another, history table, contains the non-current data.
  • 28. © 2021 Mullins Consulting, Inc. All rights reserved. • Implementing auditing using SYSTEM time temporal tables… • Typically requires a 3 step process: 1. Create the base table and include TIMESTAMP columns to track the starting and ending points for the system time period 2. Create the history table with an identical structure, preferably by using a CREATE TABLE . . . LIKE statement. 3. ALTER the current table to enable versioning thereby turning on the system temporal capability. 2. System Temporal Tables
  • 29. © 2021 Mullins Consulting, Inc. All rights reserved. 2. Temporal: Adding Data to our System Time “Table” COURSENO TITLE CREDITS PRICE SYS_START SYS_END 500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31 600 INTRO TO JAVA 2 250.00 2012-01-10 9999-12-31 650 ADVANCED JAVA 3 400.00 2012-01-10 9999-12-31 COURSE table COURSENO TITLE CREDITS PRICE SYS_START SYS_END COURSE_HIST table The table contains three rows The table is empty – After inserting these three rows → – The data look like this
  • 30. © 2021 Mullins Consulting, Inc. All rights reserved. – After issuing these statements (UPDATE and DELETE) → – Our tables now look like this 2. And then let’s DELETE from our System Time “Table” COURSE table COURSE_HIST table The table contains two rows The table contains two rows COURSENO TITLE CREDITS PRICE SYS_START SYS_END 500 INTRO TO COBOL 2 200.00 2012-01-10 9999-12-31 650 ADVANCED JAVA 3 375.00 2012-01-15 9999-12-31 COURSENO TITLE CREDITS PRICE SYS_START SYS_END 650 ADVANCED JAVA 3 400.00 2012-01-10 2012-01-15 600 INTRO TO JAVA 2 250.00 2012-01-10 2012-02-05
  • 31. © 2021 Mullins Consulting, Inc. All rights reserved. • Simply retrieve the current info for Advanced Java course: • Access info about Advanced Java course for January 16, 2012: 2. System Time: Sample Queries (#1, #2) – Returns one row → AS OF FROM BETWEEN
  • 32. © 2021 Mullins Consulting, Inc. All rights reserved. • Only useful to track modifications (U/I/D) • No tracking of access to data (read/SELECT) • No tracking of who made each change • No way to audit privileged users • Data management issues • Large amount of “old” data • Needs to be purged – but within the specifications of the regulations being complied with! • Uses the database itself to store audit data • Separation of duties: a DBA can get past it • Disconnect the temporal connection • Delete data • Reconnect 2. Issues w/Using Temporal for Auditing
  • 33. © 2021 Mullins Consulting, Inc. All rights reserved. 3. Using Triggers Similar to the temporal option, you can use database Triggers to write audit records Write a set of Triggers for the tables you wish to audit • One each for Insert, Update, and Delete Write the pertinent details – whatever you want – to audit tables you define • Or files if your DBMS allows triggers to write to files
  • 34. © 2021 Mullins Consulting, Inc. All rights reserved. • You have to write and maintain the Triggers • This can be an exposure based on who has access to the trigger code • No tracking of access to data (read/SELECT) • No way to audit privileged users • Trigger performance can be poor • Data management issues similar to temporal data • e.g.) amount of data, purging, using the database to store audit data, separation of duties 3. Issues w/Using Triggers for Auditing
  • 35. © 2021 Mullins Consulting, Inc. All rights reserved. Sometimes developers add “audit columns” to tables, such as LAST_MODIFIED_DATE • The idea here is for the program to auto- matically change the LAST_MODIFIED_DATE column in the programs whenever data is changed • Every program? Auditors don’t like this… it is a problem because: • Audit trails should be kept outside of the database • Can you guarantee that LAST_MODIFIED_DATE is accurate? 3½. Hand-coding audit trails? • If you delete the row you lose the audit data • Couldn’t someone have set it by accident (or nefariously)?
  • 36. © 2021 Mullins Consulting, Inc. All rights reserved. 4. What About Using the Database Logs? Database transaction log(s) capture ALL* changes made to data. DBMS Transaction Log(s) SQL Changes *Well, maybe not all changes, all the time. Database
  • 37. © 2021 Mullins Consulting, Inc. All rights reserved. 4. Issues With Database Log Auditing & Analysis Log format is proprietary Volume can be an issue Easy access to online and archive logs? • But how long do you keep your archive logs? Dual usage of data could cause problems? • Recovery and protection • Audit Tracks database modifications, but what about reads? • Transaction logs do not record information about SELECT And what about non-logged operations? • LOAD LOG NO, REORG LOG NO • Non-logged table spaces, LOBs Cannot invoke real-time actions using log-based auditing
  • 38. © 2021 Mullins Consulting, Inc. All rights reserved. Database auditing via network sniffing captures SQL requests as they go across the network • Some third-party database auditing solutions use this approach • Perhaps more effective for cloud database auditing But not all requests go across the wire • DBA access directly on the server • Mainframe applications (CICS, IMS/TM, TSO, batch) 5. Network Capture
  • 39. © 2021 Mullins Consulting, Inc. All rights reserved. Audit database requests at the server Capture all SQL requests at the server All SQL access can be audited, not just those made over a network Retain all pertinent audited information • Without relying on the DBMS No need to keep the active/archive log files No need to start a DBMS trace No need to modify the database schema Concerns? • Requires purchasing additional ISV software • Interfaces with DBMS internals 6. Tap Database Server Control Blocks
  • 40. © 2021 Mullins Consulting, Inc. All rights reserved. The Best Approach? All of the approaches discussed herein have their merits depending upon the type of database applications that you need to audit Database auditing products may use one or more of these different approaches and methods • Understand the methods used by any product you evaluate • For example, a combination of native tracing and capturing information from database control blocks can make for a reasonable solution
  • 41. © 2021 Mullins Consulting, Inc. All rights reserved. Let’s Discuss a Few Cloud Issues When the database exists in the cloud, remotely instead of on prem, there may be challenges that need to be understood and managed: • If the database is managed completely by the CSP, there may be a lack of visibility and control • It may be difficult to integrate cloud and on-prem audit activities • Be aware of volume and licensing issues Finally, if you rely on the cloud, make sure that any database auditing product you acquire will work with your cloud provider • and DBMS Things can get complex…
  • 42. © 2021 Mullins Consulting, Inc. All rights reserved. Benefits of Database Auditing Products • Favor products that offer built-in reporting for the regulations you need to comply with (like GDPR, HIPAA, etc.) Instead of you having to translate trace records to specific compliance requirements • Vendor maintenance and support for changing DBMS capabilities and regulatory compliance specifications • Customizable policies and alerting • Typically come with a dashboard to view compliance information, audit activities and issues • Built-in support for specific regulations • Many product consume fewer resources than alternate approaches
  • 43. © 2021 Mullins Consulting, Inc. All rights reserved. Craig S. Mullins Mullins Consulting, Inc. 15 Coventry Ct Sugar Land, TX 77479 (281) 494-6153 E-mail: [email protected] Web: www.mullinsconsulting.com https://datatechnologytoday.wordpress.com/ Data & Technology Today Blog http://www.mullinsconsulting.com/dba-corner.html DBA Corner Columns Contact Information https://tinyurl.com/cj3x4tm6