Download presentation
Presentation is loading. Please wait.
Published byGriselda Jackson Modified over 9 years ago
1
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models
2
Database Security & Auditing: Protecting Data Integrity & Accessibility2 Objectives Gain an overview of auditing fundamentals Understand the database auditing environment Create a flowchart of the auditing process List the basic objectives of an audit
3
Database Security & Auditing: Protecting Data Integrity & Accessibility3 Objectives (continued) Define the differences between auditing classifications and types List the benefits and side effects of an audit Create your own auditing models
4
Database Security & Auditing: Protecting Data Integrity & Accessibility4 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices, conduct Audit measures: compliance to policies, procedures, processes and laws
5
Database Security & Auditing: Protecting Data Integrity & Accessibility5 Definitions Audit/auditing: process of examining and validating documents, data, processes, procedures, systems Audit log: document that contains all activities that are being audited ordered in a chronological manner Audit objectives: set of business rules, system controls, government regulations, or security policies
6
Database Security & Auditing: Protecting Data Integrity & Accessibility6 Definitions (continued) Auditor: person authorized to audit Audit procedure: set of instructions for the auditing process Audit report: document that contains the audit findings Audit trail: chronological record of document changes, data changes, system activities, or operational events
7
Database Security & Auditing: Protecting Data Integrity & Accessibility7 Definitions (continued) Data audit: chronological record of data changes stored in log file or database table object Database auditing: chronological record of database activities Internal auditing: examination of activities conducted by staff members of the audited organization External auditing
8
Database Security & Auditing: Protecting Data Integrity & Accessibility8 Auditing Activities Evaluate the effectiveness and adequacy of the audited entity Ascertain and review the reliability and integrity of the audited entity Ensure the organization complies with policies, procedures, regulations, laws, and standards of the government and the industry Establish plans, policies, and procedures for conducting audits
9
Database Security & Auditing: Protecting Data Integrity & Accessibility9 Auditing Activities (continued) Keep abreast of all changes to audited entity Keep abreast of updates and new audit regulations Provide all audit details to all company employees involved in the audit Publish audit guidelines and procedures Act as liaison between the company and the external audit team
10
Database Security & Auditing: Protecting Data Integrity & Accessibility10 Auditing Activities (continued) Act as a consultant to architects, developers, and business analysts Organize and conduct internal audits Ensure all contractual items are met by the organization being audited Identify the audit types that will be used
11
Database Security & Auditing: Protecting Data Integrity & Accessibility11 Auditing Activities (continued) Identify security issues that must be addressed Provide consultation to the Legal Department
12
Database Security & Auditing: Protecting Data Integrity & Accessibility12 Auditing Environment Auditing examples: –Financial auditing –Security auditing Audit also measures compliance with government regulations and laws Audits take place in an environment: –Auditing environment –Database auditing environment
13
Database Security & Auditing: Protecting Data Integrity & Accessibility13 Auditing Environment (continued) Components: –Objectives: an audit without a set of objectives is useless –Procedures: step-by-step instructions and tasks –People: auditor, employees, managers –Audited entities: people, documents, processes, systems
14
Database Security & Auditing: Protecting Data Integrity & Accessibility14 Auditing Environment (continued)
15
Database Security & Auditing: Protecting Data Integrity & Accessibility15 Auditing Environment (continued)
16
Database Security & Auditing: Protecting Data Integrity & Accessibility16 Auditing Environment (continued) Database auditing environment differs slightly from generic auditing environment Security measures are inseparable from auditing
17
Database Security & Auditing: Protecting Data Integrity & Accessibility17 Auditing Process Quality Assurance (QA): –Ensure system is bug free and functioning according to its specifications –Ensure product is not defective as it is being produced Auditing process: ensures that the system is working and complies with the policies, regulations and laws
18
Database Security & Auditing: Protecting Data Integrity & Accessibility18 Auditing Process (continued) Performance monitoring: observes if there is degradation in performance at various operation times Auditing process flow: –System development life cycle –Auditing process: Understand the objectives Review, verify, and validate the system Document the results
19
Database Security & Auditing: Protecting Data Integrity & Accessibility19 Auditing Process (continued)
20
Database Security & Auditing: Protecting Data Integrity & Accessibility20 Auditing Process (continued)
21
Database Security & Auditing: Protecting Data Integrity & Accessibility21 Auditing Objectives Part of the development process of the entity to be audited Reasons: –Complying –Informing –Planning –Executing
22
Database Security & Auditing: Protecting Data Integrity & Accessibility22 Auditing Objectives (continued) Top ten database auditing objectives: –Data integrity –Application users and roles –Data confidentiality –Access control –Data changes
23
Database Security & Auditing: Protecting Data Integrity & Accessibility23 Auditing Objectives (continued) Top ten database auditing objectives (continued): –Data structure changes –Database or application availability –Change control –Physical access –Auditing reports
24
Database Security & Auditing: Protecting Data Integrity & Accessibility24 Auditing Classifications and Types Industry and business sectors use different classifications of audits Each classification can differ from business to business Audit classifications: also referred as types Audit types: also referred as purposes
25
Database Security & Auditing: Protecting Data Integrity & Accessibility25 Audit Classifications Internal audit: –Conducted by a staff member of the company being audited –Purpose: Verify that all auditing objectives are met Investigate a situation prompted by an internal event or incident Investigate a situation prompted by an external request
26
Database Security & Auditing: Protecting Data Integrity & Accessibility26 Audit Classifications (continued) External audit: –Conducted by a party outside the company that is being audited –Purpose: Investigate the financial or operational state of the company Verify that all auditing objectives are met
27
Database Security & Auditing: Protecting Data Integrity & Accessibility27 Audit Classifications (continued) Automatic audit: –Prompted and performed automatically (without human intervention) –Used mainly for systems and database systems –Administrators read and interpret reports; inference engine or artificial intelligence Manual audit: performed completely by humans Hybrid audit
28
Database Security & Auditing: Protecting Data Integrity & Accessibility28 Audit Types Financial audit: ensures that all financial transactions are accounted for and comply with the law Security audit: evaluates if the system is as secure Compliance audit: system complies with industry standards, government regulations, or partner and client policies
29
Database Security & Auditing: Protecting Data Integrity & Accessibility29 Audit Types (continued) Operational audit: verifies if an operation is working according to the policies of the company Investigative audit: performed in response to an event, request, threat, or incident to verify integrity of the system Product audit: performed to ensure that the product complies with industry standards
30
Database Security & Auditing: Protecting Data Integrity & Accessibility30 Benefits and Side Effects of Auditing Benefits: –Enforces company policies and government regulations and laws –Lowers the incidence of security violations –Identifies security gaps and vulnerabilities –Provides an audit trail of activities –Provides means to observe and evaluate operations of the audited entity
31
Database Security & Auditing: Protecting Data Integrity & Accessibility31 Benefits and Side Effects of Auditing (continued) Benefits (continued): –Provides a sense of security and confidence –Identifies or removes doubts –Makes the organization more accountable –Develops controls that can be used for purposes other than auditing
32
Database Security & Auditing: Protecting Data Integrity & Accessibility32 Benefits and Side Effects of Auditing (continued) Side effects: –Performance problems –Too many reports and documents –Disruption to the operations of the audited entity –Consumption of resources, and added costs from downtime –Friction between operators and auditor –Same from a database perspective
33
Database Security & Auditing: Protecting Data Integrity & Accessibility33 Auditing Models Can be implemented with built-in features or your own mechanism Information recorded: –State of the object before the action was taken –Description of the action that was performed –Name of the user who performed the action
34
Database Security & Auditing: Protecting Data Integrity & Accessibility34 Auditing Models (continued)
35
Database Security & Auditing: Protecting Data Integrity & Accessibility35 Simple Auditing Model 1 Easy to understand and develop Registers audited entities in the audit model repository Chronologically tracks activities performed Entities: user, table, or column Activities: DML transaction or logon and off times
36
Database Security & Auditing: Protecting Data Integrity & Accessibility36 Simple Auditing Model 1 (continued)
37
Database Security & Auditing: Protecting Data Integrity & Accessibility37 Simple Auditing Model 1 (continued) Control columns: –Placeholder for data inserted automatically when a record is created or updated (date and time record was created and updated) –Can be distinguished with a CTL prefix
38
Database Security & Auditing: Protecting Data Integrity & Accessibility38 Simple Auditing Model 1 (continued)
39
Database Security & Auditing: Protecting Data Integrity & Accessibility39 Simple Auditing Model 2 Only stores the column value changes There is a purging and archiving mechanism; reduces the amount of data stored Does not register an action that was performed on the data Ideal for auditing a column or two of a table
40
Database Security & Auditing: Protecting Data Integrity & Accessibility40 Simple Auditing Model 2 (continued)
41
Database Security & Auditing: Protecting Data Integrity & Accessibility41 Advanced Auditing Model Called “advanced” because of its flexibility Repository is more complex Registers all entities: fine grained auditing level Can handle users, actions, tables, columns
42
Database Security & Auditing: Protecting Data Integrity & Accessibility42 Advanced Auditing Model (continued)
43
Database Security & Auditing: Protecting Data Integrity & Accessibility43 Advanced Auditing Model (continued)
44
Database Security & Auditing: Protecting Data Integrity & Accessibility44 Historical Data Model Used when a record of the whole row is required Typically used in most financial applications
45
Database Security & Auditing: Protecting Data Integrity & Accessibility45 Historical Data Model (continued)
46
Database Security & Auditing: Protecting Data Integrity & Accessibility46 Auditing Applications Actions Model
47
Database Security & Auditing: Protecting Data Integrity & Accessibility47 C2 Security Given to Microsoft SQL Server 2000 Utilizes DACLs (discretionary access control lists) for security and audit activities Requirements: –Server must be configured as a C2 system –Windows Integrated Authentication is supported –SQL native security is not supported –Only transactional replication is supported
48
Database Security & Auditing: Protecting Data Integrity & Accessibility48 Summary Audit examines, verifies and validates documents, procedures, processes Auditing environment consists of objectives, procedures, people, and audited entities Audit makes sure that the system is working and complies with the policies, standards, regulations, and laws Auditing objectives established during development phase
49
Database Security & Auditing: Protecting Data Integrity & Accessibility49 Summary (continued) Objectives: compliance, informing, planning, and executing Classifications: internal, external, automatic, manual, hybrid Models: Simple Auditing 1, Simple Auditing 2, Advanced Auditing, Historical Data, Auditing Applications, C2 Security
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.