1 Andrew Fryer Technical Evangelist R2 Data Governance for the IT Manager.

Slides:



Advertisements
Similar presentations
Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Administering Microsoft SQL Server 2012 Databases.
The State of Security Management By Jim Reavis January 2003.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Security and Policy Enforcement Mark Gibson Dave Northey
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
©2012 Microsoft Corporation. All rights reserved..
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
Managing and Monitoring SQL Server 2005 Shankar Pal Program Manager SQL Server, Redmond.
SQL Server 2008 for Hosting Key Questions to Address How can SQL Server save your costs? How can SQL Server help you increase customer base? How can.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 8: Implementing Administrative Templates and Audit Policy.
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Module 18 Monitoring SQL Server 2008 R2. Module Overview Monitoring Activity Capturing and Managing Performance Data Analyzing Collected Performance Data.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Introduction to SQL 2005 Security Nick Ward SQL Server Specialist Nick Ward SQL Server Specialist
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Data Management Conference Data Security for Audit and Compliance Terry Room Architect, Microsoft Ltd London September 29th.
HIPAA COMPLIANCE WITH DELL
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 6 : Designing SQL Server Service-Level Security MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design Study Guide.
Module 9 Configuring Messaging Policy and Compliance.
Security David Frommer Principal Architect Business Intelligence Microsoft Partner of the Year 2005 & 2007.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Additional Security Tools Lesson 15. Skills Matrix.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Windows Role-Based Access Control Longhorn Update
Database Role Activity. DB Role and Privileges Worksheet.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
SharePoint enhancements through SQL Server RSS integration with SharePoint What’s New Elimination of IIS
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Under New Management Andrew Fryer Microsoft UK Andrew Fryer Microsoft UK.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 1 Introduction to SQL Server® 2008 R2 and its Toolset.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Module 10: Implementing Administrative Templates and Audit Policy.
Security Configuration Wizard Keith D Miller Microsoft European Support Readiness Manager.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
C Copyright © 2007, Oracle. All rights reserved. Security New Features.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
SQL Database Management
Azure SQL Database Updates
Administrating a Database
Microsoft SQL Server 2014 for Oracle DBAs Module 8
Chapter 5 : Designing Windows Server-Level Security Processes
The Dirty Business of Auditing
DAT381 Team Development with SQL Server 2005
Andrew Fryer Microsoft UK
Governing Your Enterprise with Policy-Based Management
Your Data Any Place, Any Time
Administrating a Database
SQL Server Assessment Results
Mark Quirk Head of Technology Developer & Platform Group
IT Management, Simplified
Presentation transcript:

1 Andrew Fryer Technical Evangelist R2 Data Governance for the IT Manager

2 Determining ComplianceCompliance MonitoringRemediationValidation Governance Written PoliciesBest PracticesEnforcementTraining Risk Management AssessmentPrioritizationPlan of Action Compliance results from policies that indicate a need for risk management

3 Addressing Compliance PrioritizationIgnore Mitigation costs may exceed the value of trivial data Example: Non-sensitive data may not be worth securing Avoid It’s better to avoid risks that business needs don’t require Example: Don’t store sensitive data without specific need Mitigate You must mitigate risks that can’t be ignored or avoided Example: Sensitive data must be thoroughly secured

4 Mitigation Controls Platform Security Minimize Surface Attack AreaMinimize Surface Attack Area Use latest OS, SP & App’sUse latest OS, SP & App’s Configure Ports & FirewallConfigure Ports & Firewall Identity Management Use Windows AuthenticationUse Windows Authentication Grant only required permissionGrant only required permission Use PBM to validate policyUse PBM to validate policy Separation of Duties Create dedicated role accountsCreate dedicated role accounts Ensure users have only 1 roleEnsure users have only 1 role Restrict use of ‘SA’ accountRestrict use of ‘SA’ accountAuditing Account & Role ChangesAccount & Role Changes All Administrative ActionsAll Administrative Actions Server & Database AccessServer & Database AccessEncryption Data at RestData at Rest During AccessDuring Access During TransportDuring Transport Policy Management RemediationRemediation ValidationValidation Vulnerability ReportingVulnerability Reporting Mitigation Controls Platform Security Minimize Surface Attack AreaMinimize Surface Attack Area Use latest OS, SP & App’sUse latest OS, SP & App’s Configure Ports & FirewallConfigure Ports & Firewall Identity Management Use Windows AuthenticationUse Windows Authentication Grant only required permissionGrant only required permission Use PBM to validate policyUse PBM to validate policy Separation of Duties Create dedicated role accountsCreate dedicated role accounts Ensure users have only 1 roleEnsure users have only 1 role Restrict use of ‘SA’ accountRestrict use of ‘SA’ accountAuditing Account & Role ChangesAccount & Role Changes All Administrative ActionsAll Administrative Actions Server & Database AccessServer & Database AccessEncryption Data at RestData at Rest During AccessDuring Access During TransportDuring Transport Policy Management RemediationRemediation ValidationValidation Vulnerability ReportingVulnerability Reporting

5 Analyzing Compliance Requirements Aligning Vulnerabilities to Mitigation Controls Categorize requirements according to their areas of concern: Map those areas of concern to SQL Server and platform capabilities

6 Identifying Requirements Examples OS version must be under current Microsoft support A Password change variance, complexity and change time limit policy must be in place Secure Platform Revoke CONNECT privileges from Public and Guest Ensure individual accounts for each user, application, etc. Identity and SOD All data files must be encrypted Provide offline, offsite storage of the Service Master Key Encryption algorithms must be FIPS compliant Encryption Server and Database access must be recorded Security assignment changes must be recorded Audit data must be retained for a minimum time period Audit

7 New SQL Server 2008 Features Policy Based Management SQL Audit Transparent Data Encryption Extensible Key Management Change Data Capture Data Collection Central Management Servers

8 Policy-Based Management (PBM) Customer Challenges Managing IT compliance is too difficult Not enough out-of-box tools to automate the compliance management process There is no clear approach for managing baseline configuration changes between version releases

9 Policy Based Management (PBM) Overview Eliminates scripted or manual procedures for compliance configuration and management Policies are entities for automation that declare desired state & execution behavior Custom Policy definitions are easily created using SQL Server Management Studio

10 Policy Based Management (PBM) Executes through a built-in Policy Engine: Manually executed by Administrator On Demand Executed as a SQL Agent Job On Schedule Logs configuration changes that would violate policy On Change - Log Only Proactively prevents any changes that would violate policy On Change - Prevent

11 SQL Server 2008 Audit Replaces a collection of Microsoft and third-party tools to: Provide a comprehensive approach to Auditing Expose a broader array of events Provide a better management experience Render much higher performance Trace Profiler Logs Triggers

12 SQL Server 2008 Audit Feature Architecture Server Audit Specification Server Audit Action Database Audit Specification Database Audit Action SQL Server Audit Object File System File Security Event Log Application Event Log

13 SQL Server 2008 Audit Feature Role-Based Security Sys-Admins Creates and manages auditsCreates and manages audits Reads and appends to any audit fileReads and appends to any audit fileOperators Reads audit metadataReads audit metadata Determines whether or not an audit is runningDetermines whether or not an audit is runningAuditor Reads and manages auditsReads and manages audits Reads audit logsReads audit logs Auditor (Read-only) Reads audit metadataReads audit metadata Reads audit logsReads audit logs

14 Transparent Data Encryption (TDE) Encrypts data at rest: Detached Data Files Transaction Log Files Backup Files Implemented at the database level Transparent to the application: Requires no application modifications to take advantage of encryption Encryption/Decryption occurs at I/O SQL Server 2008 DEK Client Application Encrypted Data Page

15 Extensible Key Management (EKM) Enables centralized storage & management of keys from all SQL Servers in an enterprise Can be used to store both symmetric and asymmetric keys outside the server Depends on 3rd Party Hardware Security Modules (HSM) to provide solutions based on custom implementations of industry standard algorithms

16 SQL Server 2008 Compliance Guide Whitepaper: Reaching Compliance Demonstrates How to Achieve Compliance Assessing Vulnerability Defining Risk Mitigation Models Managing Security Configurations Also includes Hands-on Labs

17 Session Takeaways 4 Things to Remember Categorize your requirements to align with SQL Server 2008’s approach to managing security and compliance configurations Policy-Based Management (PBM) replaces scripts, BPA, & other CM tools for defining, maintaining, and reporting desired state SQL Audit replaces SQL Profiler, Triggers and 3rd Party Log readers for auditing Leverage the SQL 2008 Compliance Guide and its sample scripts and policies

18 Resources Microsoft data governance portal SQLCAT Compliance Guide for SQL Server hing-compliance-sql-server-2008-compliance-guide.aspx Compliance Solution Accelerators (including PCI) us/solutionaccelerators/dd aspx

19 © 2009 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.