Presentation is loading. Please wait.

Presentation is loading. Please wait.

Back-End Data Security

Similar presentations


Presentation on theme: "Back-End Data Security"— Presentation transcript:

1 Back-End Data Security
Three Things and Three Places… Not Just the Database!

2 Author Page Infrastructure and security architect
Database Administrator / Architect Former Incident response team lead Certified Information Systems Auditor (CISA) SQL Server security columnist / blogger Editor for SQL Server benchmarks at Center for Internet Security

3 Contact Information K. Brian Kelley Infrastructure/Security Blog: Personal Development Blog:

4 Goals Get you in an adversary mindset
Consider areas traditionally neglected Understand the “insider” threat

5 Agenda A Solid INFOSEC Model The “Insider” Threat
Three Things and Three Places Applying the Things to Places Two Examples to Consider

6 Information Security’s C-I-A Triad
It’s easy to focus on Confidentiality and Integrity, but Availability is important. If users can’t use the system, the system is worthless.

7 Principle of Least Privilege
The permission to do the job. Nothing more. Threatens confidentiality. Threatens integrity. Nothing less. Threatens availability.

8 The Insider Threat The vast majority aren’t the problem.
Sometimes you have bad people. Sometimes people turn bad. OR – An adversary can act like an insider.

9 My Miss Emma Example Miss Emma may be the purest soul walking today.
You can’t just think about Miss Emma. What if Miss Emma falls to a phishing attack? SC DOR or Anthem compromise Attacks against Defense Industry contractors. RSA Compromise Aurora attacks Assume that a user account will be compromised

10 Three Things to Worry About
Unauthorized Data Access Unauthorized Data Change Unauthorized Process Change

11 Three Places to Worry About
Source In-Flight Destination

12 Places: Web Servers / Services
Are they vulnerable to SQL Injection? What and who connect to them? Are they using HTTPS? What else is on the same web server?

13 Places: File System Questions
Who has ability to modify the files? Who has ability to read the files? What processes can touch the files? Can you detect file tampering?

14 Places: Database Questions
Who can read the data? Who can modify the data? Can you verify data integrity?

15 Places: Network Questions
Is sensitive data being sent across? If so, is it encrypted? If you're using SSL, who controls the CA? If it isn't encrypted, is someone watching?

16 Example: SSIS Packages
Who can update the packages? Are you checking for updates? Can you detect an unauthorized update? How about during the ETL process?

17 Example: Web Services Who can administer the web server?
Who can change the code? Can you detect a change? Can you reverse the change?

18 Goals Get you in an adversary mindset
Consider areas traditionally neglected Understand the “insider” threat

19 Thank You! Questions? K. Brian Kelley
Twitter: @kbriankelley Tech/Sec blog: Prof. Dev. blog: Center for Internet Security:


Download ppt "Back-End Data Security"

Similar presentations


Ads by Google