Database Security and Auditing

Download Report

Transcript Database Security and Auditing

Database Security and
Auditing: Protecting Data
Integrity and Accessibility
Chapter 8
Application Data Auditing
Objectives
• Understand the difference between the auditing
architecture of DML Action Auditing Architecture
and DML changes
• Create and implement Oracle triggers
• Create and implement SQL Server triggers
• Define and implement Oracle fine-grained
auditing
Database Security and Auditing
2
Objectives (continued)
• Create a DML statement audit trail for Oracle
and SQL Server
• Generate a data manipulation history
• Implement a DML statement auditing using a
repository
Database Security and Auditing
3
Objectives (continued)
• Understand the importance and the
implementation of application errors auditing in
Oracle
• Implement Oracle PL/SQL procedure
authorization
Database Security and Auditing
4
DML Action Auditing Architecture
• Data Manipulation Language (DML):
companies use auditing architecture for DML
changes
• DML changes can be performed on two levels:
– Row level
– Column level
• Fine-grained auditing (FGA)
Database Security and Auditing
5
DML Action Auditing Architecture
(continued)
Database Security and Auditing
6
DML Action Auditing Architecture
(continued)
Database Security and Auditing
7
Oracle Triggers
• Stored PL/SQL procedure executed whenever:
– DML operation occurs
– Specific database event occurs
• Six DML events (trigger timings): INSERT,
UPDATE, and DELETE
• Purposes:
– Audits, controlling invalid data
– Implementing business rules, generating values
Database Security and Auditing
8
Oracle Triggers (continued)
Database Security and Auditing
9
Oracle Triggers (continued)
• CREATE TRIGGER
• Executed in a specific order:
– STATEMENT LEVEL triggers before COLUMN
LEVEL triggers
– BEFORE triggers before AFTER triggers
• USER_TRIGGERS data dictionary view: all
triggers created on a table
• A table can have unlimited triggers: do not
overuse them
Database Security and Auditing
10
Oracle Triggers (continued)
Database Security and Auditing
11
SQL Server Triggers
• CREATE TRIGGER DDL statement: creates a
trigger
• Trigger condition:
– Prevents a trigger from firing
– UPDATE() and COLUMNS_UPDATE() functions
• Logical tables:
– DELETED contains original data
– INSERTED contains new data
Database Security and Auditing
12
SQL Server Triggers (continued)
• Restrictions—Transact-SQL statements not
allowed:
–
–
–
–
–
–
–
ALTER and CREATE DATABASE
DISK INIT and DISK RESIZE
DROP DATABASE and LOAD DATABASE
LOAD LOG
RECONFIGURE
RESTORE DATABASE
RESTORE LOG
Database Security and Auditing
13
Implementation of an Historical Model
with SQL Server
• Create a history table:
– Same structure as original table
– HISTORY_ID column
• Create a trigger: inserts original row into the
HISTORY table
Database Security and Auditing
14
Fine-grained Auditing (FGA) with
Oracle
• Oracle provides column-level auditing: Oracle
PL/SQL-supplied package DBMS_FGA
• DBMS_FGA procedures:
–
–
–
–
ADD_POLICY
DISABLE_POLICY
DROP_POLICY
ENABLE_POLICY
Database Security and Auditing
15
Fine-grained Auditing (FGA) with
Oracle (continued)
• ADD_POLICY parameters:
–
–
–
–
–
–
OBJECT_SCHEMA
OBJECT_NAME
POLICY_NAME
AUDIT_CONDITION
AUDIT_COLUMN
HANDLER_SCHEMA
Database Security and Auditing
16
Fine-grained Auditing (FGA) with
Oracle (continued)
• ADD_POLICY parameters (continued):
– HANDLER_MODULE
– ENABLE
– STATEMENT_TYPES
• DBA_FGA_AUDIT_TRAIL: view the audit trail
of the DML activities
Database Security and Auditing
17
DML Action Auditing with Oracle
• Record data changes on the table:
– Name of the person making the change
– Date of the change
– Time of the change
• Before or after value of the columns are not
recorded
Database Security and Auditing
18
DML Action Auditing with Oracle
(continued)
Database Security and Auditing
19
DML Action Auditing with Oracle
(continued)
• Steps:
– Use any user other than SYSTEM or SYS; with
privileges to create tables, sequences, and
triggers
– Create the auditing table
– Create a sequence object
– Create the trigger that will record DML
operations
– Test your implementation
Database Security and Auditing
20
History Auditing Model Implementation
Using Oracle
• Historical data auditing is simple to implement;
main components are TRIGGER objects and
TABLE objects
• Keeps record of:
– Date and time the copy of the record was
captured
– Type of operation applied to the record
Database Security and Auditing
21
History Auditing Model Implementation
Using Oracle (continued)
• Steps:
– Use any user other than SYSTEM or SYS; with
privileges to create tables, sequences, and
triggers
– Create history table
– Create the trigger to track changes and record
all the values of the columns
– Test your implementation
Database Security and Auditing
22
DML Auditing Using Repository with
Oracle (Simple 1)
• Simple Auditing Model 1
• Flag users, tables, or columns for auditing
• Requires less database administrative skills:
– Application administrators can do it
– User interface is built in top of the repository
• Auditing flags are flexible
• Does not record before or after column values;
only registers type of DML operations
Database Security and Auditing
23
DML Auditing Using Repository with
Oracle (Simple 1) (continued)
Database Security and Auditing
24
DML Auditing Using Repository with
Oracle (Simple 1) (continued)
• Steps:
–
–
–
–
–
Use any user other than SYSTEM or SYS
Create triggers
Create sequence object
Build tables to use for applications
Populate application tables
Database Security and Auditing
25
DML Auditing Using Repository with
Oracle (Simple 1) (continued)
• Steps (continued):
– Populate auditing repository with metadata
– Create the stored package to be used with the
trigger
– Create triggers for application tables
– Test your implementation
Database Security and Auditing
26
DML Auditing Using Repository with
Oracle (Simple 2)
• Simple Auditing Model 2: requires a higher level
of expertise in PL/SQL
• Stores two types of data:
– Audit data: value before or after a DML
statement
– Audit table: name of the tables to be audited
Database Security and Auditing
27
DML Auditing Using Repository with
Oracle (Simple 2) (continued)
Database Security and Auditing
28
DML Auditing Using Repository with
Oracle (Simple 2) (continued)
• Steps:
– Use any user other than SYSTEM or SYS; with
privileges to create tables, and triggers
– Create the auditing repository
– Establish a foreign key in AUDIT_DATA table
referencing AUDIT_TABLE table
– Create a sequence object
– Create the application schema
Database Security and Auditing
29
DML Auditing Using Repository with
Oracle (Simple 2) (continued)
• Steps (continued):
– Add data to tables
– A stored PL/SQL package will be used for
auditing within the triggers
– Create triggers for audited tables
– Add auditing metadata
– Test your implementation
Database Security and Auditing
30
Auditing Application Errors with Oracle
• Application errors must be recorded for further
analysis
• Business requirements mandate to keep an
audit trail of all application errors
• Materials:
– Repository consisting of one table
– Methodology for your application
Database Security and Auditing
31
Auditing Application Errors with Oracle
(continued)
• Steps:
– Select any user other than SYSTEM or SYS;
with privileges to create tables, and procedures
– Populate tables
– Create the ERROR table
– Create a stored package to perform the
UPDATE statement
– Test your implementation: perform and update
using the CREATE package
Database Security and Auditing
32
Oracle PL/SQL Procedure
Authorization
• Oracle PL/SQL stored procedures are the
mainstay of implementing business rules
• Security modes:
– Invoker rights: procedure is executed using
security credentials of the caller
– Definer rights: procedure is executed using
security credentials of the owner
Database Security and Auditing
33
Oracle PL/SQL Procedure
Authorization (continued)
• Steps:
– Create a new user
– Select a user with CREATE TABLE and
PROCEDURE privileges
– Populate tables
– Create stored procedure to select rows in a table
– Grant EXECUTE privileges on new procedure
– Log on as the new user and query the table
– Execute procedure
Database Security and Auditing
34
Summary
• Two approaches for DML auditing:
– Set up an audit trail for DML activities
– Register all column values before or after the
DML statement (column-level auditing)
• Fine-grained auditing (Oracle)
• Triggers:
– Stored PL/SQL procedure automatically
executed
– Oracle has six DML events
Database Security and Auditing
35
Summary (continued)
• Triggers are executed in order
• USER_TRIGGERS data dictionary view: shows
all triggers
• SQL Server 2000:
– CREATE TRIGGER DDL statement
– Conditional functions: UPDATE() and
COLUMNS_UPDATED()
• FGA allows generation of audit trail of DML
activities
Database Security and Auditing
36
Summary (continued)
• FGA is capable of auditing columns or tables;
Oracle PL/SQL-supplied package DBMS_FGA
• PL/SQL stored procedures security modes:
– Invoker rights
– Definer rights
Database Security and Auditing
37