2009 Architecture Plan Overview 2009 Architecture Plan Overview.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

Enabling Secure Internet Access with ISA Server
CS5204 – Operating Systems 1 A Private Key System KERBEROS.
Use Mobile Guidebook to Evaluate this Session – M1.5 Allowing Students to Update Their Program of Study Online.
Module 12: Auditing SQL Server Environments
Kaba Time Collection System- Supervisor Training.
Overview of IS Controls, Auditing, and Security Fall 2005.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Access Control Methodologies
Security and Integrity
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Software Testing and Quality Assurance
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Overview Distributed vs. decentralized Why distributed databases
Asset: Academic Survey System & Evaluation Tool Bert G. Wachsmuth Seton Hall University.
Adapted from Afyouni, Database Security and Auditing Database Application Auditing – Ch. 8.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
1 LOGICAL ACCESS FOR University Medical Group Saint Louis University Click the Speaker Icon for Audio.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
By Lecturer / Aisha Dawood 1.  Administering Users  Create and manage database user accounts.  Create and manage roles.  Grant and revoke privileges.
Configuring Identity Manager 2 (formerly DirXML ® ) for JDBC (w/DirXML) Jason Elsberry Software Engineer
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Uniting Cultures, Technology & Applications A Case Study University of New Hampshire.
Security Architecture
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Footer Text A Tool for Environmental Scheduling, Accountability and Performance Measurement TxECOS.
Tom Castiglia Hershey Technologies
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Stored procedures1 Stored procedures and functions Procedures and functions stored in the database.
Copyright © 2013 Curt Hill Database Security An Overview with some SQL.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
SQL Injection Jason Dunn. SQL Overview Structured Query Language For use with Databases Purpose is to retrieve information Main Statements Select Insert.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
3-Tier Client/Server Internet Example. TIER 1 - User interface and navigation Labeled Tier 1 in the following graphic, this layer comprises the entire.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
Database Security Lesson Introduction ●Understand the importance of securing data stored in databases ●Learn how the structured nature of data in databases.
Academic Year 2014 Spring Academic Year 2014 Spring.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
3 Copyright © 2006, Oracle. All rights reserved. Designing and Developing for Performance.
Access control techniques Once an organization decides upon the access control model it will implement(DAC,MAC, or RBAC), then it needs to look at the.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
1 Copyright © 2005, Oracle. All rights reserved. Oracle Database Administration: Overview.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
REDCap General Overview
Database and Cloud Security
Database System Concepts and Architecture
IBM Cognos Analytics Administrator V11 C Questions Answers
asset: Academic Survey System & Evaluation Tool
Systems Design Chapter 6.
Cloud computing mechanisms
Lecture 2 - SQL Injection
Presentation transcript:

2009 Architecture Plan Overview 2009 Architecture Plan Overview

The Problem Set Cumbersome process for obtaining user access Problematic Data Security Query Construction is difficult No record of data use for capacity planning and auditing

User Access Approval Path 2-8 weeks per decision

Problematic Data Security Table/view level access permits broader access to data than users require (Invites inappropriate usage) Entire tables may be copied to user systems Essential access may be denied because of collateral risks (Essential data in one part of a table may be denied to prevent exposure of sensitive information in a different part) No record of data requests and usage (who used or tried to use inappropriate data) The security level of datasets is not formally classified There is no reliable way to identify users of departmental accounts

Query Construction Issues Users must understand data encoding and structure to obtain valid results (cryptic codes like ‘AS’ must be used to filter data. Multiple rows of identical keys must be processed carefully to select the correct row) Improper JOIN conditions may create incorrect results and adversely impact performance Syntax errors may produce confusing, or even worse, undetected errors that require additional technical support This is not an exhaustive list

No record of usage Precludes analysis for capacity planning Precludes analysis for inappropriate usage Precludes detection of attempted or actual abuse Precludes reporting of usage to user management Abuse or fraud detection Data product valuation (Hey! We use this a lot, don’t we?) New application analysis

Information Worker Needs A desk A chair A telephone A computer Information (Data needed to perform job)

Information Worker Needs A desk A chair A telephone A computer Information (Data needed to perform the work) Guiding Principle Information Workers are entitled to all of the tools needed to do the job, especially the data. They don’t need any further justification for access to the data.

2009 CDW Architecture Data Packaging 3 Tier Architecture Integral CAS security Usage Logging Fine grained access Automates basic user access Simplifies restricted user access Transparent access to foreign systems Collaborative development protocol

Data Packaging and Classification Data is provided using packages of functions that return rowsets. There is no direct user access to tables or views Each package is classified by the Data Stewards according to the security level of the data it provides: Private (The database is used to host private data) Public (Data that is public information) Confidential (Business data that contains no “Sensitive” information) Restricted (Contains “Sensitive” information like grades, gender, academic standing…)

3 Tier Architecture Back end database using Oracle database product Middle layer implemented in Oracle PL/SQL User Interface may be anything that can make a SQL call and process a rowset return. (PHP, Cold Fusion, MSAccess, Excel,.net, JSP…)

3 Tier Architecture Why PL/SQL? (and not SOAP or other web service) We already own the technology We understand it Users already know how to access it We are able to extend it with Java We have a PL/SQL 3 tier application in production We have good, free development tools Collaborative development requires minimal training

3 Tier Architecture

Integral CAS security Campus standard single sign on Proxy ticket provides guaranteed user Kerberos ID for fine grained authentication and usage logging

Integral CAS security

Usage Logging Each data requests captures : User Kerberos (or ) ID Connection name (typically department account) Name of package/function Security classification Timestamp Parameters used Number of rows returned Success or Failure (reason for failure)

Usage Logging

Fine Grained Access Restricted data access is controlled by an access table Table entries are keyed on KerberosID and contain permissions to fetch RESTRICTED data Rights to RESTRICTED data are authorized by the user’s director/dean/provost Access grants are reported to data stewards Access is suspended when the user changes payroll status

Fine Grained Access

Automatic Basic User Access Individual user accounts to CDW are phased out. Execution rights to PUBLIC and CONFIDENTIAL packages are granted to departmental accounts. Any user that has access to a departmental server (or SISDS) is automatically granted access to its departmental level packages. The Kerberos ID may optionally be checked against employment status to exclude non-employees from designated packages.

Simplified Restricted Access A director/dean/provost may autonomously grant access to a Restricted package The director is contractually obligated to bear responsibility for the appropriateness of the access grant An electronic record of the grant is reported to the Data Stewards, who may direct that access be suspended or revoked The grant is automatically suspended when employment status changes

Transparent Access To Foreign Systems The CDW has the capability to serve as a portal to any database in the world Foreign data may be collected and stored in the CDW for subsequent access Foreign data may be accessed in real time and returned using the same PL/SQL table function semantics as internal data

Transparent Access to Foreign Systems Remote Data System via JDBC

Collaborative Development Departmental collaborator is granted full development rights in CDW development system for the duration of the project CDW staff provide guidance, standards and implementation of collaboration products Data analysts may still apply to the Data Stewards for direct table access in order to perform research on the base data

Transparent Access to Foreign Systems Collaborator Accounts