Database Encryption

Download Report

Transcript Database Encryption

Database Security and Data
Protection
Suseel Pachalla, CISSP
Outline











Why is Database Security Critical?
Database Environment
Database Security Threats
Database Hardening
Database Activity Monitoring/Auditing
Database Encryption
Risk Reduction
Business / Solution Challenges
Solution requirements
Recommendations
Q&A
Why is Database Security Critical ?
 Protect Data from Internal/External ThreatsIntellectual, Business Confidential
Information, Customer and Consumer Data,
Employee data etc
 Separation of Duties
 Data Integrity
 Regulatory Requirements-GLBA, HIPAA etc…
 Of course, to protect sensitive Data
Database Environment
 Network Environment-Internal/External
 Hardware- Server, Desktop etc
 SHARED Environment- Co-Existence of
different Applications
 Off Shore Environment
 Environment-Specific to OS/Database
Database Security Threats
 Insider Threat
 Authentication, Authorization and Access
Control-(AAA)
 Privilege AbuseLegitimate/Excessive/Elevation
 SQL Injection
 Weak Audit Trail
 DB Platform Vulnerabilities
 DB Communication Protocol Vulnerabilities
 DOS Attacks
Database Hardening







Least Privilege
Secured Infrastructure
Access Control
Disable/Rename unwanted accounts
Password Management
Patch Management
Securing Ports
Database Activity Monitoring/Auditing
 Monitoring is a Detective control, not
preventive.
 Access Policies-Well Defined to Monitor
 Impact on application and Network
Performance-Monitoring
 Auditing
 Audit what is required
 Disk Space Issues
 Audit as per Regulatory Requirements
Database Encryption - Strategies
 Encryption of Data within or outside the database
Encryption within DB
Client
Application
Server
Encryption outside DB
Client
Application
Server
Key management
server
Database
Database
Database Encryption - Methods
 Generic Encryption Methods:
 Symmetric Encryption – uses same key to encrypt
and decrypt, usage of Block Cipher or Stream
Cipher, Algorithm usage such as 3DES, AES with a
key length of at least 128-bits.
 Asymmetric Encryption- Uses a pair of keys,
mainly used for data transmissions.
 Kinds of DB Encryption:
 DB File Level Encryption
 DB Column Level Encryption
Symmetric Database Encryption
 Encryption Process
SSN -
123 45 6789
Encryption Key
+
Encryption Algorithm
Encrypted SSN –
“4#@_&g_*9AS”
Risk Reduction – Database Encryption
 Risk is reduced, in case of





Theft of media
Abuse of DBMS privilege
Abuse of OS system level privilege
Theft of Privilege
Transaction record tampering
Business / Solution Challenges
 Business Challenges
 Expensive
 Need more resources to manage – security DBA
 Need additional hardware and processing
capabilities
 Solution Challenges




Legacy application changes
Performance Issues
Application integration
Key Management-Encryption
Solution requirements
 Native DB Security Tools
 Third party tools – Protegrity, Vormetric,
Voltage etc..
 Additional Hardware
 Resources- Security DBA, Hardware
maintenance etc …
Recommendations
 Trade-off between security and performance
 Apply appropriate security strategy keeping
performance and data flow in mind
 Separation of Environments
 Encryption-Separate DB from Key storage
location
Questions