Download presentation
Presentation is loading. Please wait.
Published byNigel Dorsey Modified over 8 years ago
1
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Application design issues which cause database management issues Database Authentication Approaches: Application ID passed to Database Server from secured middle-tier 1
2
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Application design issues which cause database management issues Database Authentication Approaches: Application ID passed to Database Server from user’s workstation 2
3
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Application design issues which cause database management issues Database Authentication Approaches: Direct Database Connection User’s individual ID passed to Database Server by Application Server/Citrix Server 3
4
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Application design issues which cause database management issues Database Authentication Approaches: Direct Database Connection User’s individual ID passed to Database Server from their Workstation 4
5
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Hidden Secret: Application design issues which cause database management issues Conditions – Most developers have knowledge of the Application ID/password ID & passwords are coded in clear text within program or ini file Can use ID & Password to connect to database and directly update tables – Access is below OS level security (Distributed Environment only) – Users are assigned application level logon which is also a database ID which has insert/update access to database tables to allow application to function as required Can choose not to logon through application and instead connect directly to database to alter tables 5
6
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Hidden Secret: Application design issues which cause database management issues Controls used to mitigate risk – Application ID Security Design Encrypt password IPsec rules on router/firewalls to only allow App server to connect to database server Remove all apps from workstations and connect from secured middle-tier 6
7
©Copyright Audit Serve, Inc. 2008 - 2013 All Rights Reserved Hidden Secret: Application design issues which cause database management issues Controls used to mitigate risk – Application ID Security Design Detective review processes which identify when ID is initiated from workstation instead of “controlled” middle-tiers (i.e., Web Server, Application Server, Citrix or Terminal Server) - 3-tier application design only – Need to identify IP Address/Machine Name Control breaks down if shared workstation Ability to spoof IP/Machine Name in connection stream (SQL Server – when SQL trace used) Database security which only permits users to utilize the access through pre-defined access paths – Oracle & SQL Server Application Roles User loses access entitlements when not going through the application Requires coding within application 7
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.