49
© 2009 IBM Corporation InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions

DSS ITSEC 2013 Conference 07.11.2013 - ALSO - Guardium INTRO

Embed Size (px)

DESCRIPTION

Presentation from one of the remarkable IT Security events in the Baltic States organized by “Data Security Solutions” (www.dss.lv ) Event took place in Riga, on 7th of November, 2013 and was visited by more than 400 participants at event place and more than 300 via online live streaming.

Citation preview

Page 1: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

InfoSphere Guardium

Ingmārs Briedis ([email protected])IBM SW solutions

Page 2: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Agenda

• Any questions unresolved?

• The Guardium Architecture

• Integration with Existing Infrastructure

• Summary

Page 3: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 4: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 5: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 6: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 7: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Sensitive data – credit card number

Page 8: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 9: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 10: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 11: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 12: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 13: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 14: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 15: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 16: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 17: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 18: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Real-Time Database Security & Monitoring

• 100% visibility including local DBA access

• No DBMS or application changes

• Minimal impact on DB performance

• Enforces separation of duties with tamper-proof audit repository

• Granular policies, monitoring & auditing providing the Who, What, When & How

• Real-time, policy-based alerting

• Can stores between 3-6 months worth of audit data on the appliance itself and integrates with archiving systems

DB2 Microsoft SQL Server

Privileged Users

Page 19: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 20: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 21: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 22: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Any questions unresolved?

• How many DBs you have today?

• Which of them has sensitive date ?

• Are there any DB configuration defaults left?

• Do you have up-to-date software ?

• Can you completely trust your superusers?

• Lack of configuration file versioning ?

• Problems with log file integrity or real time alerting ?

• Are there any requirements for security compliance ?

• Who is who – is this really the DB user we thought ?

Page 23: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Identify Users within Connection Pooling applications – Uncover potential fraud– Accurate audits of user access to sensitive tables

Supported Enterprise Applications– Oracle E-Business Suite, PeopleSoft, Business Objects Web Intelligence,

JD Edwards, SAP, Siebel, In-house custom applications

Various Methods Used to Capture Application User ID– Collect unique ID from the underlying database via table, trigger, etc.– Monitor calls to a procedures and fetch information from their parameters– S-TAP probe on application or proxy server grabs the user ID

Application User Monitoring with Guardium

Page 24: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 25: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 26: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

The Guardium Architecture

Page 27: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation27

Integration with LDAP, Kerberos, SNMP/SMTP, ArcSight, RSA SecurID

& enVision, McAfee ePO,

IBM TSM, Tivoli, Remedy, etc.

Page 28: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Integration with Existing Infrastructure

Page 29: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 30: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Integration with Existing InfrastructureSIEM

(ArcSight, EnVision, Tivoli, etc.)Directory Services

(Active Directory, LDAP, etc.)

Long Term Storage(EMC Centera, IBM TSM

FTP, SCP, etc.) Application Servers(Oracle EBS, SAP, Siebel,

Cognos, PeopleSoft, WebSphere, etc.)

Vulnerability Standards

(CVE , STIG, CIS Benchmark)

Software Deployment(Tivoli, RPM,

Native Distributions)

SNMP Dashboards(HP OpenView, Tivoli, etc.)

Sensitive Data

- ---- - - - - -

xxx-xx-xxxx - - - - - - -

Change Ticketing Systems- Remedy, Peregrine, etc

Send Alerts(CEF, CSV,

syslog)

McAfee(EPO)

Authentication(RSA SecurID, RADIUS,

Kerberos)

Data Leak & Data Classification

Page 31: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Summary

Page 32: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 33: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 34: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Page 35: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Guardium provides our customers with…

• Real-time monitoring of all database access

• Policy-based controls to rapidly detect unauthorized or suspicious activity

• Automated compliance workflow to efficiently meet regulatory requirements

• Centralized control and policy enforcement for most database and application environments

• Informix, DB2, Oracle, SQL Server, z/OS, Sybase, etc

• SAP, Siebel, Oracle EBS, PeopleSoft, WebSphere, etc

Page 36: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Top Regulations Impacting Database Security

Page 37: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Database Activity Monitoring (DAM)Supported Platforms

Page 38: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

How are most databases audited today?

Reliance on native audit logs within DBMS

× Lacks visibility and granularity• Privileged users difficult to monitor

• Tracing the “real user” of application is difficult

• Level of audit detail is insufficient

× Inefficient and costly• Impacts database performance

• Cumbersome reporting, forensics and alerting

• Different methods for each DB type

× No segregation of duties• DBAs manage monitoring system

• Privileged users can bypass the system

• Audit trail is unsecured

Page 39: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation39

• SQL Errors and failed logins

• DDL commands (Create/Drop/Alter Tables)

• SELECT queries

• DML commands (Insert, Update, Delete)

• DCL commands (Grant, Revoke)

• Procedural languages

• XML executed by database

• Returned results sets

What does Guardium monitor?

Page 40: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Full Cycle of Securing Critical Data Infrastructure

• Vulnerability assessment• Configuration assessment

• Behavioral assessment• Baselining

• Configuration lock-down & change tracking

• Encryption

• 100% visibility• Policy-based actions• Anomaly detection

• Real-time prevention• Granular access controls

• Centralized governance

• Compliance reporting• Sign-off management• Automated escalations• Secure audit repository• Data mining for forensics• Long-term retention

• Discover all databases, applications & clients

• Discover & classify sensitive data Discover

&

Classify

Assess

&

Harden

Monitor

&

Enforce

Audit

&

Report

The Database Security Lifecycle

Page 41: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

• Vulnerability assessment• Configuration assessment

• Behavioral assessment• Baselining

• Configuration lock-down & change tracking

• Encryption

• 100% visibility• Policy-based actions• Anomaly detection

• Real-time prevention• Granular access controls

• Centralized governance

• Compliance reporting• Sign-off management• Automated escalations• Secure audit repository• Data mining for forensics• Long-term retention

• Discover all databases, applications & clients

• Discover & classify sensitive data Discover

&

Classify

Monitor

&

Enforce

Audit

&

Report

The Database Security Lifecycle

Full Cycle of Securing Critical Data Infrastructure

Assess

&

Harden

Page 42: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation42

• Vulnerability assessment• Configuration assessment

• Behavioral assessment• Baselining

• Configuration lock-down & change tracking

• Encryption

• 100% visibility• Policy-based actions• Anomaly detection

• Real-time prevention• Granular access controls

• Centralized governance

• Compliance reporting• Sign-off management• Automated escalations• Secure audit repository• Data mining for forensics• Long-term retention

• Discover all databases, applications & clients

• Discover & classify sensitive data Discover

&

Classify

Assess

&

Harden

Monitor

&

Enforce

Audit

&

Report

The Database Security Lifecycle

Full Cycle of Securing Critical Data Infrastructure

Page 43: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation43

Full Cycle of Securing Critical Data Infrastructure

• Vulnerability assessment• Configuration assessment

• Behavioral assessment• Baselining

• Configuration lock-down & change tracking

• Encryption

• 100% visibility• Policy-based actions• Anomaly detection

• Real-time prevention• Granular access controls

• Centralized governance

• Compliance reporting• Sign-off management• Automated escalations• Secure audit repository• Data mining for forensics• Long-term retention

• Discover all databases, applications & clients

• Discover & classify sensitive data Discover

&

Classify

Assess

&

Harden

Monitor

&

Enforce

Audit

&

Report

The Database Security Lifecycle

Page 44: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Four Sets of Roles

• Privileged Users

• End Users

• Developers, System Analysts and System Administrators

• IT Operations

Page 45: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Privileged Users

• Special high-level privileges

• Typically database administrators (DBAs), superusers and system administrators

• Should always be subject to intense scrutiny from the security organization and from auditors

• Potential problem activities

– Access to, deletion of, or changes to data

– Access using inappropriate or nonapproved channels

– Schema modifications

– Unauthorized addition of user accounts or modification of existing accounts

Page 46: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

End Users

• Individuals who have legitimate access to data through some type of application

• Present serious risks for deliberate as well as unwitting misuse of that data

• Potential problem behaviors

– Access to excessive amounts of data or data not needed for legitimate work

– Access to data outside standard working hours

– Access to data through inappropriate or nonapproved channels

Page 47: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Developers, System Analysts and System Administrators

• These roles necessarily have extremely high levels of privilege and access

– The potential for data breaches that compromise intellectual property or personal privacy

• The ability to access or change systems that are in live production

– poor performance

– system crashes

– security vulnerabilities

• Potential problem activities

– Access to live production systems

Page 48: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

IT Operations

• Have a significant impact on the proper functioning and management of enterprise databases

• Their database-related activities should be audited in two key areas

– Unapproved changes to databases or applications that access the database

– Out-of-cycle patching of production systems

Page 49: DSS ITSEC 2013 Conference 07.11.2013  - ALSO - Guardium INTRO

© 2009 IBM Corporation

Summary

• Risks related to data privacy breaches have never been greater

• Fine-grained monitoring of database access is the best way to protect from data being compromised

• A unified and consistent approach across the database infrastructure will save time, money, and increase security

• Guardium continues to be the market leader because of comprehensive functionality and ease of implementation