Enterprise Auditing with SQL Server Audit Colleen Morrow.

Slides:



Advertisements
Similar presentations
Yukon – What is New Rajesh Gala. Yukon – What is new.NET Framework Programming Data Types Exception Handling Batches Databases Database Engine Administration.
Advertisements

Module 12: Auditing SQL Server Environments
Security Pertemuan 7 Matakuliah: T0413 Tahun: 2009.
ManageEngine ® SQLDBManager Plus - Product Overview.
Oracle9i Database Administrator: Implementation and Administration 1 Chapter 12 System and Object Privileges.
Chapter 9 Auditing Database Activities
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Brian Alderman | MCT, CEO / Founder of MicroTechPoint Pete Harris | Microsoft Senior Content Publisher.
Chapter 10 Overview  Implement Microsoft Windows Authentication Mode and Mixed Mode  Assign login accounts to database user accounts and roles  Assign.
Database Security Managing Users and Security Models.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Adapted from Afyouni, Database Security and Auditing DB Auditing Examples (Ch. 9) Dr. Mario Guimaraes.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Module 8: Server Management. Overview Server-level and instance-level resources such as memory and processes Database-level resources such as logical.
Chapter 4 SQL. SQL server Microsoft SQL Server is a client/server database management system. Microsoft SQL Server is a client/server database management.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Chapter Oracle Server An Oracle Server consists of an Oracle database (stored data, control and log files.) The Server will support SQL to define.
CHAPTER 6 Users and Basic Security. Progression of Steps for Creating a Database Environment 1. Install Oracle database binaries (Chapter 1) 2. Create.
Database Technical Session By: Prof. Adarsh Patel.
Sofia, Bulgaria | 9-10 October SQL Server 2005 High Availability for developers Vladimir Tchalkov Crossroad Ltd. Vladimir Tchalkov Crossroad Ltd.
Week 6 Lecture 2 System and Object Privileges. Learning Objectives  Identify and manage system and object privileges  Grant and revoke privileges to.
Extending Vista The PowerLinks WebServices SDK John Hallett Senior Product Manager WebCT, Inc
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Chapter 6 : Designing SQL Server Service-Level Security MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design Study Guide.
Security David Frommer Principal Architect Business Intelligence Microsoft Partner of the Year 2005 & 2007.
MICROSOFT SQL SERVER 2005 SECURITY  Special Purpose Logins and Users  SQL Server 2005 Authentication Modes  Permissions  Roles  Managing Server Logins.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 © Copyright IBM Corporation 2008 DB2 9 Fundamentals.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
Module 14 Configuring Security for SQL Server Agent.
Module 5: Upgrading to SQL Server 7.0. Overview Planning an Upgrade Preparing to Upgrade Verifying the Upgrade Setting a Compatibility Level.
SQL: DDL. SQL Statements DDL - data definition language –Defining and modifying data structures (metadata): database, tables, views, etc. DML - data manipulation.
Roles & privileges privilege A user privilege is a right to execute a particular type of SQL statement, or a right to access another user's object. The.
Introduction to Oracle. Oracle History 1979 Oracle Release client/server relational database 1989 Oracle Oracle 8 (object relational) 1999.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 9 Auditing Database Activities.
1 Chapter Overview Defining Operators Creating Jobs Configuring Alerts Creating a Database Maintenance Plan Creating Multiserver Jobs.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Module 6: Data Protection. Overview What does Data Protection include? Protecting data from unauthorized users and authorized users who are trying to.
Increasing security by disabling DML statements to a dba user in Oracle database Hakik PACI Polytechnic University of Tirana.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
SQL Server 2005 Implementation and Maintenance Chapter 6: Security and SQL Server 2005.
Oracle 11g: SQL Chapter 7 User Creation and Management.
Intro To Oracle :part 1 1.Save your Memory Usage & Performance. 2.Oracle Login ways. 3.Adding Database to DB Trees. 4.How to Create your own user(schema).
SQL SERVER AUDITING. Jean Joseph DBA/Consultant Contact Info: Blog:
1 11g NEW FEATURES ByVIJAY. 2 AGENDA  RESULT CACHE  INVISIBLE INDEXES  READ ONLY TABLES  DDL WAIT OPTION  ADDING COLUMN TO A TABLE WITH DEFAULT VALUE.
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
Making Sense of Service Broker Inside the Black Box.
Understand Data Definition Language (DDL) Database Administration Fundamentals LESSON 1.4.
Putting Your Head in the Cloud Working with SQL Azure David Postlethwaite 19/09/2015David Postlethwaite.
SQL Advanced Monitoring Using DMV, Extended Events and Service Broker Javier Villegas – DBA | MCP | MCTS.
In this session, you will learn to: Manage databases Manage tables Objectives.
Pass4itsure Microsoft Dumps
SQL Database Management
With Temporal Tables and More
SQL Server Security & Intrusion Prevention
Microsoft SQL Server 2014 for Oracle DBAs Module 8
Securing Data with SQL Server 2016
Policy Based Management: Introduction & implementation
SQL Server Security For Everyone
Managing Multi-user Databases
Download Microsoft Exam Dumps - Valid Microsoft Question Answers - Realexamdumps.com
Auditing in SQL Server 2008 DBA-364-M
Solving ETL Bottlenecks with SSIS Scale Out
SQL Server Security from the ground up
Making Sense of Service Broker
Enterprise Auditing with SQL Server Audit
SQL Server Security from the ground up
We Need To Talk Security
Presentation transcript:

Enterprise Auditing with SQL Server Audit Colleen Morrow

About me  Colleen Morrow  SQL Server consultant at UpSearch  10+ years of SQL Server experience   Contributor to Tribal SQL 2

Agenda Why audit? Introduction to SQL Server Audit Defining audit requirements Implementing SQL Server Audit Handling audit data 3

Your company employs an outside firm to perform security audits Required by law to perform auditing Supplement a change management system Answer the question, “what changed?” Determine who’s accessing that sensitive data Determine what a particular login is being used for Why audit? 4

SQL Audit: Introduction  Built on Extended Events framework  Events recorded at permission-check time  Executes asynchronously or synchronously  Enjoys long walks on the beach 5

SQL Audit: Terminology Server Audit Database audit specification Server audit specification 6

What actions can you audit?  Objects object is created, altered or dropped object is accessed (e.g. DML, EXECUTE) ownership changes permission changes server objects, database objects, schema objects 7

What actions can you audit? (cont.)  Security principals are created, altered, or dropped database/server role is added or removed principal is added to or removed from a role. successful/failed logins password changes a password is changed for an application role 8

What actions can you audit? (cont.)  Databases a database is created, altered, or dropped. ownership changes permission changes  Backups backup/restore operations 9

What actions can you audit? (cont.)  Audits/Traces any audit is created, modified or deleted. any audit specification is created, modified, or deleted. any change to an audit is audited in that audit. statements that check for the ALTER TRACE permission. 10

What actions can you audit? (cont.)  Server state the SQL Server service state is modified  DBCC a principal issues any DBCC command  User Defined Events 11

What can’t you audit?  Temp tables #temp and ##temp tables not audited  Internal events E.g. locking, transaction log growth from large transactions 12

Where? How many servers? What version/editions? What? What events? What data for the event? How critical is it? Can you afford to miss any events? How will the data be viewed? Ad hoc? Formal report? How long should it be retained? Defining audit requirements 13

Example #1: Security in Azure To: Dan Wilson From: Stephanie Conroy Dan, Now that we’ve deployed the ordering system infrastructure to Azure virtual machines, I’m concerned about security. I want to make sure we’ve locked things down as much as possible. Is there any way to know who is or is trying to log into the database? Thanks much, Stephanie Conroy Network Manager AdventureWorks, Inc. 14

Audit requirements 15 Security Where?Single instance on Azure VM What? Logins, Logouts, Failed Logins; Login name, Event time, session duration, client hostname/IP How critical?Some event loss Viewed?Ad hoc report Retention?1 week

Demonstration Create Server Audit Read audit file

 fn_get_audit_file ( file_pattern,  { default | initial_file_name | NULL },  { default | audit_record_offset | NULL } ) file_pattern – the path and file name of the audit file(s) to be read; file name can be or include a wildcard. initial_file_name – first file to process; all subsequent files will also be processed. audit_record_offset – Used in conjunction with the initial file name to tell SQL Server where in that initial file to start. Reading audit data 17

Using fn_get_audit_file()  Select * from fn_get_audit_file (‘c:\MyAudits\Security*’ , ‘File 2’ , 7200 )  Select * from fn_get_audit_file (‘c:\MyAudits\Security*’ , ‘File 1’ , 9650 )  Select * from fn_get_audit_file (‘c:\MyAudits\Security*’ , NULL , NULL ) File 1File 2File

Example #2: Troubleshooting To: Dan Wilson From: Karen Berg Hey Dan, You know that audit you configured for to help us troubleshoot erroneous updates to ProductInventory? It’s a lot of data to sift through and really we’re only interested in updates to the Bin column. Any way you can refine the audit? Thanks, Karen Berg Application Specialist AdventureWorks, Inc. 19

20 Audit requirements Troubleshooting Where?Single database What? Updates to specific column Login/username, event time, statement or procedure How critical?No event loss Viewed?Ad hoc viewing Retention?No requirement

Demonstration User-defined events Synchronous auditing

Permissions check / Audit check Expand Event details Send to Audit Xevent session Record event Synchronous-icity AsyncSynchronous QUEUE_DELAY =

Performance Impact 23

Example #3: Change Management To: All IT Employees From: Jean Trenary As a result of AdventureWorks, Inc. becoming a publicly traded company, IT systems will be undergoing a yearly audit, to be conducted by an external firm. Part of this auditing process is a reconciliation between Production-level changes and change management tickets. To help facilitate the yearly audit, we are now requesting monthly reports from each Production environment listing all object changes during the previous month and the corresponding ticket number. Thank you, Jean Trenary Information Services Manager AdventureWorks, Inc. 24

Audit requirements 25 Change Management Where?All production databases What? Database object changes (DDL) Server, database, schema, object, login, event time, statement How critical?No event loss Viewed?Monthly/Annual report Retention?18 months

Demonstration Using PowerShell Managing audit data

Recap Why audit? Introduction to SQL Server Audit Defining audit requirements Implementing SQL Server Audit Handling audit data 27

QUESTIONS

Thank You This FREE SQL Saturday is brought to you courtesy of these sponsors, speakers and volunteers who staff this event

Please Support Our Sponsors SQL Saturday is made possible with the generous support of these sponsors. You can support them by opting-in and visiting them in the sponsor area.