Database Audit---sqlsever audit of preferred NetWrix

Source: Internet
Author: User

Database Audit----Preferred auduit for NetWrix Sqlsever


Database Audit Concepts

Audit, the English language is called " Audit , to check and verify the accuracy and completeness of the objectives, to prevent false data and deceptive practices, and to comply with established standards, benchmarks and other auditing principles.

Information Technology Audits, is an information technology ( IT inspection within the control area of the infrastructure. Information System audit is a process of judging whether the information system can protect the security of assets, maintain the integrity of the data, make the target of the audited unit be realized effectively, and make the resources of the Organization be used efficiently by collecting and evaluating the audit evidence.

As an important part of information security Audit, database audit is also an important part of database management system security. With the audit function, all operations related to database security can be recorded. As long as the audit records are detected, the system security staff can master the database is used. For example, check the access mode of entities in the library to monitor the behavior of the specified user. The audit system can keep track of the user's operation, which also makes the audit system have a deterrent force, reminding the user to use the database safely.

Database Audit Legislation

"Sarbanes 2002sarbanes-oxley Act 302 Terms and section 404 it system internal control, where, it

internal control Code of the Enterprise -- The internal audit mechanism of basic norms, China's Sarbanes-Oxley Act, the establishment of a sound internal audit institutions, strengthen internal audit supervision is to create a law-abiding, fair and upright internal environment of the important guarantee. Enterprises should strengthen internal audit work, forming a good atmosphere within the enterprise that has the right to be responsible and to be supervised by the right to use.

ISO7498" Information Processing System Interconnection-basic Reference Model" Part II security architecture in the "General description of security services and security mechanisms," the Security audit trail provides an important security mechanism, its potential value lies in the post-mortem security audit to detect and investigate security vulnerabilities. Security audit is the independent evaluation of the record and behavior of the system., The goal is to test whether the system is properly controlled., ensure consistency with established strategy and operational stack, helps to make damage assessment, and evaluation of changes specified in controls, strategies and procedures.Security audits require that security-related information be logged in the Security audit trail, Analyze and report information obtained from the Security audit trail. Such logging or recording is considered a security mechanism and is described in this article, analyze and report as a security management function.

"Computer Information system security grade protection database management technology Requirements" is a computer information system security level protection technical requirements of a series of standards, detailing the computer information system for the realization GB17859 The proposed security level protection requirements for the database management system security technology requirements, and to ensure that these security technologies to achieve the security functions to achieve their proper security to take the assurance measures. It is explicitly required in the database security audit:

The security audit of database management system should establish an independent security audit system, define the audit events related to database security, set up a special security auditor, set up a security audit database dedicated to storing audit data for databases, and provide tools for security audit setup, analysis, and review for database systems.

650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M02/89/59/wKiom1gQUozh_3O6AAAmqwe6bxs433.jpg-wh_500x0-wm_3 -wmp_4-s_920056545.jpg "title=" netwrix.jpg "alt=" Wkiom1gquozh_3o6aaamqwe6bxs433.jpg-wh_50 "/>

NetWrix is a company that specializes in it audits. Founded in2006is headquartered in Irvine, California. As a global gold partner, Microsoft is committed toWINDOWSPlatform forITenvironmental audits. is the global -The most powerful software manufacturer in the industry. Designed to provide complete visibility with philosophical theoryITinfrastructure and strengthenITSafety,SimplifyITRegulatory Compliance and optimisationIToperation. To beITsimplify their work. Right nowNetWrixthe supported audit products includeNetWrix Auditor for AD,NetWrix Auditor for Exchange,netwrixauditor for File Server,NetWrix Auditor for SQL Server,Netwrixauditor for Vmware,NetWrix Auditor for Windows Server,NetWrix Auditor for SharePoint,Netwrixauditor for EMC.

database auditing is an important part of any data security strategy. Businesses must audit their databases to prevent the most valuable data breaches, comply with regulatory standards, and ensure that data is available to applications and users within the 7x24. the netwrix SQL Server Audit tool simplifies the audit and reporting of your database to help businesses ensure that their critical data is protected from unauthorized access.

consolidate by detecting and investigating suspicious modifications SQL Server the security

Timely Control SQL Server , such as creating or deleting a database user account, a specific database, a table, or a permission grant for a stored procedure. Quickly detects all inappropriate behaviors that can put data at risk. Investigate events by using interactive search and identify how to prevent similar events from happening again in the future.

650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M00/89/57/wKioL1gQUirAkg_4AABss__TABU332.png-wh_500x0-wm_3 -wmp_4-s_3752635165.png "style=" Float:none; "title=" 1-1.png "alt=" Wkiol1gquirakg_4aabss__tabu332.png-wh_50 "/>

Get SQL Server control of internal activities, proof of compliance

prove to internal and external auditorsSQL Serverall changes in the environment are traceable and can be quickly answered such as who deleted the production endSQLthe database or the production sideSQLhow the schema of the database table is modified. For historical e-discovery and compliance purposes, you canSQL ServerSecurity Audit data for consolidated, two-tier storage (file-based+based onSQLdata) in a way that preservesTenyears or more.

650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M01/89/57/wKioL1gQUk_QPpUMAABmQ2OmiaU835.png-wh_500x0-wm_3 -wmp_4-s_3450781517.png "title=" 1-2.png "alt=" Wkiol1gquk_qppumaabmq2omiau835.png-wh_50 "/>

prepare with less energy and faster SQL Server Change Report

Overcoming SQL Server Trace Limitations of limited auditing and reporting capabilities. Without the need to manually process large amounts of raw data, simply access predefined audit reports and dashboards to give you a comprehensive view of the details of each change in an easy-to-read format, so you can filter and sort. Interactive search engines can easily refine the audit data you need.

650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M02/89/59/wKiom1gQUmGhAVqOAABgkeVRuOw592.png-wh_500x0-wm_3 -wmp_4-s_1249748304.png "title=" 1-3.png "alt=" Wkiom1gqumghavqoaabgkevruow592.png-wh_50 "/>

650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M00/89/59/wKiom1gQUrDA3MHkAABEvcr8fjE986.png-wh_500x0-wm_3 -wmp_4-s_1493246790.png "title=" 6.png "alt=" Wkiom1gqurda3mhkaabevcr8fje986.png-wh_50 "/>

This article from the "12205019" blog, reproduced please contact the author!

Database Audit---sqlsever audit of preferred NetWrix

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.