Additional Security Tools Lesson 15. Skills Matrix.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Access Control Chapter 3 Part 3 Pages 209 to 227.
Database Management System
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Client/Server Databases and the Oracle 10g Relational Database
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Chapter 7 Database Auditing Models
Chapter 5 Database Application Security Models
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
CSIS Database Security, Dr. Guimaraes Adapted from Afyouni, Database Security and Auditing Database Auditing (Ch. 7) Overview of Auditing Overview.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
Cloud Operating System Unit 13 Cloud System Management II M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung,
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
The Islamic University of Gaza
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Roy Ernest Database Administrator Pinnacle Sports Worldwide SQL Server 2008 Transparent Data Encryption.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Data Integrity Lesson 12. Skills Matrix Maintaining Data Integrity Maintaining data integrity is your most important responsibility. –Performing backups.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Module 10: Maintaining Active Directory. Overview Introduction to Maintaining Active Directory Moving and Defragmenting the Active Directory Database.
- Ahmad Al-Ghoul Data design. 2 learning Objectives Explain data design concepts and data structures Explain data design concepts and data structures.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
SharePoint enhancements through SQL Server RSS integration with SharePoint What’s New Elimination of IIS
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
Microsoft Advertising 16:9 Template Light Use the slides below to start the design of your presentation. Additional slides layouts (title slides, tile.
Secure SQL Database with TDE Thomas Chan SQL Saturday Raleigh.
Maintaining and Updating Windows Server 2008 Lesson 8.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Client/Server Databases and the Oracle 10g Relational Database
Module Overview Installing and Configuring a Network Policy Server
Chapter 5 : Designing Windows Server-Level Security Processes
Deploying and Configuring SSIS Packages
Introduction of Week 6 Assignment Discussion
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
IS4680 Security Auditing for Compliance
Secure/Encrypt SQL Server Database With TDE
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Additional Security Tools Lesson 15

Skills Matrix

Guarding Your Data Maintaining data integrity can also involve data encryption and auditing.

Encryption You can put another layer, encryption, on top of all this security. SQL Server encrypts data with hierarchical encryption and key management infrastructure. Each layer encrypts the layer below it by using a combination of certificates, asymmetric keys, and symmetric keys, in scopes that parallel the permissions hierarchy

SQL Server Encryption To encrypt your connections to SQL Server, you first need to get a certificate. You can get one from one of the major vendors such as VeriSign, or you can install Windows Certificate services and supply your own. Once you have a certificate, you need to install it on the server. Finally, you need to configure the clients to request encrypted connections to the server.

SQL Server Encryption The database-level cryptographic features in SQL Server rely on a database master key. This key does not generate automatically when you create the database. –It must be created by the system administrator. You need but one master key per database.

Transparent Data Encryption SQL Server 2008 includes a new feature known as Transparent Data Encryption (TDE). This encryption is transparent to the application code as SQL Server 2008 automatically handles the encryption and decryption of all data going in to and out of the database. The primary purpose of this TDE feature is to have the entire database encrypted so that any unauthorized person having direct access to copies of the database files and / or transaction log files cannot decrypt and read the data.

Transparent Data Encryption It is critically important to understand that the database master key and the encryption certificate need to be backed up to a secure location. This location also needs to be separate from regular backups or other copies of the database files. The encryption security provided by TDE is meaningless if database files and the certificate both fall into the hands of the wrong person.

Extensible Key Management SQL Server 2008 includes a new feature known as Extensible Key Management (EKM). This is a method of providing for encryption methods using software and possibly hardware such as smart cards or USB devices provided by third-party entities. With EKM, encryption can be established using physical hardware known as a Hardware Security Module (HSM). This can be a more secure solution because the encryption keys do not reside with encrypted data in the database. Instead, the keys are stored on the hardware device.

Audits Audits keep a record of database activities. Set configuration options for the factors of concern and then review the results. If you suspect someone uses an employee’s login inappropriately, audit for logins and look for suspicious behaviors.

C2 Criteria In 1985, the Department of Defense published DOD Directive STD, Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria” known familiarly as the “Orange Book” which was part of the “Rainbow Series” of security evaluation criteria. The Orange Book laid out a matrix where A was the most trusted and D the least trusted. Numbers were also used where 1 was the most stringent criteria. The resultant classes, then, are A1, B1, B2, B3, C1, C2 and D.

C2 Criteria C2 requires controlled access protection and is deemed appropriate for “business sensitive” data—less guarded then confidential, secret or top secret classifications. C2 requires individual accountability through login procedures, audit trails, object reuse and resource isolation. SQL Server provides these protections

Auditing Auditing an instance of SQL Server or a SQL Server database involves tracking and logging events that occur on the system. SQL Server Utility provides you a means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management.

SQL Server Utility SQL Server Utility provides you a means to audit and manage your SQL Server environment as a whole through the concept of application and multiserver management. The SQL Server Utility models your organization’s SQL Server-related entities in a unified view.

SQL Server Utility Architecture

SQL Server Utility Utility Explorer and SQL Server Utility viewpoints (in SSMS) provide administrators a holistic view of resource health through an instance of SQL Server that serves as a utility control point (UCP). Entities viewable in a SQL Server UCP include instances of SQL Server, data-tier applications, database files and storage volumes. Resource use can be monitored for CPU and storage use.

Summary SQL Server encryption provides an additional security protection from hackers or eavesdroppers. While someone might access your file stream or table, they will find the information undecipherable. This comes at the expense of additional overhead.

Summary With auditing you can create a record of what happens on your SQL Server instance. You can record successful connections to learn who uses what resources how often. A management report might be appropriate to reward diligent employees. With SQL Utility you can monitor the resource health of your entire enterprise and produce near real-time management and analysis reports.

Summary for Certification Examination Know how to configure encryption on a column. Understand transparent data encryption and its value. For a given situation, determine which auditing technique can be of value.