Database Management Security Strategy

Source: Internet
Author: User

It is clear to all that the data stored in the database is important for both businesses and governments, but it is puzzling that these database security is somehow overlooked, at least for those involved in lawsuits involving data theft and disclosure.

This is not a deliberate effort to pick up database administrators and offend the entire IT industry, but database administrators and security administrators do need to communicate further to improve security issues for these important resources without impacting the performance of the database. A common constraint is that the database administrator is unable to implement the security mechanism because of the high performance loss associated with it. The purpose of this paper is not to explore the various internal mechanisms of database security, nor to discuss the pros and cons of these mechanisms. The purpose of this paper is to make some suggestions on how to protect the security of the database while transferring the security of database administrators, and do not unduly affect the performance of the database brother.

In the past few years, the problem of database security has been involved in the mainstream of information security issues, in part because senior security researchers have increasingly focused their research on database security issues. Their research has exposed a series of vulnerabilities, including some well-known database products, to the sun, from defects in database software design to traditional buffer overflows. Moreover, their findings suggest that, in general, database vendors are not as diligent in distributing patches as operating system providers.

Technology is not a panacea, but it is a good medicine to save database security. For example, companies like Guardium and Secerno provide a database firewall that controls the flow of information to and from the database based on a comprehensive understanding of the underlying database communication.

These tools know the SQL statements passed to the back-end database and can reject the running of SQL statements that are considered dangerous. If you're a bit nervous about using a relatively immature technology to specify access decisions so that you can block bad access to information that depends on your mission-critical system, you can use these tools in detection mode until you have accumulated enough trust. A database audit trail that is completely outside the control of the database administrator can be a target. Implementing a higher level of separation of functions is much better than relying on the internal audit capabilities of the database.

In addition, there are many tools that can be used to perform automatic security audits of the database. They can be used in general databases and can provide detailed security vulnerability reports, along with recommendations for remedial action.

In addition to using security tools, there are security guidelines to be developed and implemented, including hardening of databases and hosts, proper review of database administrators, effective user management, and regular patching. The tools discussed in this article can help reduce the risk of theft of your most valuable assets-database data-through simple database security measures.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.