Artikel TopTen Database Threats
Artikel TopTen Database Threats
Artikel TopTen Database Threats
Database Threats
Table of Contents
Section 1: Introduction to Database Security Threats
Section 5: Summary
10
10
Database Threats
Red Flag
Less than 5% of the $27
billion spent in 2011
on security products
directly addressed data
center security.
When hackers and malicious insiders gain access to sensitive data, they can quickly extract value,
inflict damage, or impact business operations. In addition to financial loss or reputation damage,
breaches can result in regulatory violations, fines, and legal fees. However, the good news is that
the vast majority of incidents more than 97% according to the Online Trust Alliance (OTA) in 2013
could have been prevented by implementing simple steps and following best practices and internal controls.
Privilege Abuse
SQL Injection
Malware
SQL Injection
Denial of Service
Denial of Service
10
NEW
NEW
Privilege Elevation
Exploitation of Vulnerable, Miconfigured Databases
By addressing these top ten threats, organizations can meet global compliance requirements and industry best practices related
to data protection and risk mitigation. The first nine can be addressed using an automated Database Auditing and Protection
(DAP) platform, an approach which improves security, simplifies compliance, and increases operational efficiency.
Database Threats
2 Privilege Abuse
Users will abuse legitimate database privileges for unauthorized purposes. Consider an internal healthcare application used to
view individual patient records via a custom Web interface. The Web application normally limits users to viewing an individual
patients healthcare history multiple patient records cannot be viewed simultaneously and electronic copies are not allowed.
However, a rogue user might be able to circumvent these restrictions by connecting to the database using an alternative client
such as MS-Excel. Using Excel and their legitimate login credentials, the user could retrieve and save all patient records to their
laptop. Once patient records reach a client machine, the data then becomes susceptible to a wide variety of possible breach
scenarios.
3 SQL Injection
A successful SQL injection attack can give someone unrestricted access to an entire database. SQL injection involves inserting (or
injecting) unauthorized or malicious database statements into a vulnerable SQL data channel such as a Web application or stored
procedure. If these injected statements are executed by the database, critical data stores can be viewed, copied, and altered.
4 Malware
Cybercriminals, state-sponsored hackers, and spies use advanced attacks that blend multiple tactics such as spear phishing
emails and malware to penetrate organizations and steal sensitive data. Unaware that malware has infected their device,
legitimate users become a conduit for these groups to access your networks and sensitive data.
Database Threats
When users access the database via enterprise Web applications (such as SAP, Oracle E-Business Suite, or PeopleSoft) it can be
challenging to understand what database access activity relates to a specific user. Most audit mechanisms have no awareness of
who the end user is because all activity is associated with the Web application account name. Reporting, visibility, and forensic
analysis are hampered because there is no link to the responsible user.
Finally, users with administrative access to the database, either legitimately or maliciously obtained, can turn off native database
auditing to hide fraudulent activity. Audit duties should ideally be separate from both database administrators and the database
server platform to ensure strong separation of duties policies.
9 Denial of Service
Denial of Service (DoS) is a general attack category in which access to network applications or data is denied to intended users.
DoS conditions can be created via many techniques. The most common technique used in database environments is to overload
server resources such as memory and CPU by flooding the network with database queries that ultimately cause the server to crash.
The motivations behind DoS attacks are often linked to extortion scams in which a remote attacker will repeatedly crash servers
until the victim meets their demands. Whatever the source, DoS represents a serious threat for many organizations.
Data
Protection
Non-Tech.
Security
Encrypt Databases
Limited Security
Knowledge
Denial of Service
Unmanaged
Sensitive Data
Vulnerability
Exploitation
Storage Exposure
Malware
Auditing
SQL Injection
Solution
Privilege Abuse
Threat
Excessive and
Unused Privileges
As mentioned in the first section of this paper, the top ten database security threats can be prevented by implementing simple
steps and following best practices and internal controls. Because there are many different attack vectors associated with each
threat, a multi-layered defensive strategy is needed to properly protect databases. The matrix below identifies solutions for each of
the top ten database threats. Detailed solution descriptions are presented following the matrix.
User Rights
Management
Database Threats
Database Threats
Database Threats
Database Threats
Impose Connection Controls: Prevent server resource overload by limiting connection rates, query rates, and other variables for
each database user.
Validate Database Protocols: Leverage database activity monitoring solutions that can analyze the protocol and isolate
random/anomalous communications. When atypical communication events are detected, the solution should trigger an alert or
block the transaction.
Response Timing: Database DoS attacks designed to overload server resources lead to delayed database responses. This includes
delays in both individual query responses and the overall system. Use solutions that monitor response timing and generate alerts
when response delays or system sluggishness is observed.
Auditing
Automate Auditing with a DAP Platform: Implement a DAP solution that delivers the performance, scalability, and flexibility
to meet the needs of the most demanding environments. A DAP solution can address most of the weaknesses associated with
native audit tools:
Separation of Duties: DAP solutions operate independently of database administers, making it possible to separate audit
duties from administrative duties. In addition, they operate independently of the database server and are invulnerable to
privilege elevation attacks carried out by non-administrators.
Cross-Platform Auditing: DAP solutions support database platforms from multiple vendors enabling uniform standards
and centralized audit operations across large and distributed heterogeneous database environments.
Performance: Leading DAP solutions can leverage appliances that operate at line speed and have zero impact on database
performance. In fact, by offloading audit processes to network appliances rather than using native auditing, organizations can
expect to improve database performance.
Capture Detailed Transactions: To support regulatory compliance requirements, advanced fraud detection, and forensic
analysis, DAP solutions can capture audit logs that include details such as source application name, complete query text, query
response attributes, source OS, source host name, and more. Use auditing rules to collect the required information needed for
regulatory compliance (e.g. SOX, PCI DSS, and HIPPA) or to meet internal audit requirements.
Generate Reports for Compliance and Forensics: Summarize and format database activity details into reports that help meet
compliance requirements, conduct forensic investigations, communicate vital database activity statistics, and monitor system
performance. Leverage DAP solutions that include reports for industry and government regulations which can be customized to
meet business needs.
Data Protection
Archive External Data: Automate the long-term data archival processes. Use solutions that can be configured to periodically
archive data to external mass storage systems. Data should be optionally compressed, encrypted, and signed prior to archival.
Encrypt Databases: Encrypt sensitive data across heterogeneous database environments. This allows you to secure both
production and backup copies of databases, then audit the activity of and control access to sensitive data from users who access
databases at the operating system and storage tiers. By leveraging database auditing along with encryption, organizations can
monitor and control users both inside and outside of the database.
Non-Technical Security
Cultivate Experienced Security Professionals: To defend against a growing array of internal and external threats, hire information
security personnel that are well versed in IT Security and have experience implementing, administering, and monitoring security
solutions. Ongoing education and training are also important for growing deeper security knowledge and skills. Consider outside
IT security and specialists to help with implementation, conduct security assessments and penetration tests, and provide training
and support for your administrators.
Database Threats
Educate Your Workforce: Train your workforce on risk mitigation techniques including how to recognize common cyber-threats
(e.g. a spear-phishing attack), best practices around Internet and email usage, and password management. Failure to enforce
training and create a security conscious work culture increases the chances of a security breach. The end result is well-informed
users who are trained to securely function when connected to key systems.
Summary
Failing to safeguard databases that store sensitive data can cripple your operations, result in regulatory violations, and destroy
your brand. Understanding the top database threats and implementing the solutions outlined in this paper will enable you to
recognize when youre vulnerable or being attacked, maintain security best practices, and ensure that your most valuable assets
are protected.
Video [2:28]
10
About Imperva
Imperva is a pioneer and leader of a new category of business security solutions for critical applications and high-value data in the
data center. Impervas award-winning solutions protect against data theft, insider abuse, and fraud while streamlining regulatory
compliance by monitoring and controlling data usage and business transactions across the data center, from storage in a database
or on a file server to consumption through applications.
For more information, visit www.imperva.com, follow us on Twitter or visit our blog.
Tweet this!
Post this!
Share this!
Imperva
Headquarters
3400 Bridge Parkway, Suite 200
Redwood Shores, CA 94065
Tel: +1-650-345-9000
Fax: +1-650-345-9004
Toll Free (U.S. only): +1-866-926-4678
www.imperva.com
Copyright 2013, Imperva
All rights reserved. Imperva and SecureSphere are registered trademarks of Imperva.
All other brand or product names are trademarks or registered trademarks of their respective holders. #WP-TOP10-DATABASE-THREATS-0213rev1