Selecting Software Packages for Secure Database Installations
|
|
- Bryan Goodwin
- 6 years ago
- Views:
Transcription
1 Selecting Software Packages for Secure Database Installations Afonso Araújo Neto, Marco Vieira This document includes complementary information for the paper Selecting Software Packages for Secure Database Installations which was submitted to the Fifth Latin-American Symposium on Dependable Computing. It contains information regarding the full list of security best practices, the corresponding importance weights and the full gap analysis matrix. Table 1. MS configuration security best practices devised from the analysis of the CIS documents # SECURITY BEST PRACTICE (CIS) Recommendations in CIS documents M O8 O10 S ENVIRONMENT 1 Use a dedicated machine for the database Avoid machines which also run critical network services (naming, authentication, etc) Use Firewalls: on the machine and on the network border Prevent physical access to the MS machine by unauthorized people 1 5 Remove from the network stack all unauthorized protocols Create a specific user to run the MS daemons Restrict MS user access to everything he doesn't need Prevent direct login on the MS user account INSTALLATION SETUP 9 Create a partition for log information Only the MS user should read/write in the log partition 1 11 Create a partition for data Only the MS user should read/write in the data partition 1 13 Separate the MS software from the files Remove/Avoid default elements: 14»»»Remove example databases »»»Change/remove user names/passwords »»»Change remote identification names (SID, etc...) »»»Change TCP/UDP Ports »»»Do not use default SSL certificates 1 19 Separate production and development servers No developer should have access to the production server Use different network segments for production and development servers Verify all the installed MS application files: 22»»»Check and set the owner of the files »»»Set read/running permissions only to authorized users OPERATIONAL PROCEDURES 24 Keep the MS software updated Make regular backups Test the backups 1 1 SYSTEM LEVEL CONFIGURATION 27 Avoid random ports assignment for client connections (firewall configuration) Enforce remote communication encryption with strong algorithms Use server side certificate if possible Use IPs instead of host names to configure access permissions (prevents DNS spoofing) Enforce strong user level authentication Prevent idle connection hijacking Ensure no remote parameters are used in authentication Avoid host based authentication Enforce strong password policies Apply excessive failed logins lock Apply password lifetime control 1 1
2 38 Deny regular password reuse (force periodic change) Use strong encryption in password storage 3 40 Enforce comprehensive logging Verify that the log data cannot be lost (replication is used) Audit sensible information Verify that the audit data cannot be lost (replication is used) 1 1 Ensure no side-channel information leak (don t create/restrict access): 44»»»From configuration files »»»From system variables 1 46»»»From core_dump/trace files »»»From backups of data and configuration files Avoid the interaction between the MS users and the : 48»»»Deny any read/write on file system from MS used »»»Deny any network operation (sending , opening sockets, etc...) »»»Deny access to not needed extended libraries and functionalities »»»Deny access to any information and commands 2 APPLICATION LEVEL CONFIGURATION AND USAGE 52 Remove user rights over system tables Remove user quotas over system areas Implement least privilege policy in rights assignments Avoid ANY and ALL expressions in rights assignments Do not delegate rights assignments No user should have rights to change system properties or configurations Grant privileges to roles/groups instead of users Do not maintain the schema creation SQL files in the server 1 Total number of recomendations Table 2. Complementary DoD configuration best practices # COMPLEMENTARY BEST PRACTICES (DoD) Group 1A Monitor de MS application and configuration files for modifications Operational Procedures 2A Do not use self signed certificates System Level Config. 3A Protect/encrypt application code Appl. Level Config./Usage 4A Audit application code changes Appl. Level Config./Usage 5A Employ stored procedures and views instead of direct table access Appl. Level Config./Usage Best practices weights The following table presents the individual weights given by the experts, the relative importance to the attack surface and the cumulative importance for each best practice. For each contributor, E stands for engineer and A for academic. Best Relative Cumul. E1 E2 A3 A4 E5 A6 E7 A8 A9 Practice Weight Weight ,26% 5,26% ,73% 9,99% ,21% 14,19% ,21% 18,40% ,21% 22,60% ,68% 26,28% ,68% 29,96% ,68% 33,64% ,63% 37,27% ,15% 40,42% ,10% 43,52% ,00% 46,52% ,58% 49,10% ,52% 51,61% ,10% 53,72% ,10% 55,82%
3 ,05% 57,87% ,05% 59,92% ,00% 61,92% ,00% 63,91% ,00% 65,91% ,99% 67,90% ,52% 69,43% ,52% 70,95% ,47% 72,42% ,41% 73,84% ,41% 75,25% ,41% 76,66% ,37% 78,02% ,24% 79,26% ,00% 80,26% ,00% 81,26% ,95% 82,21% ,95% 83,15% ,94% 84,09% ,89% 84,99% ,89% 85,88% ,88% 86,76% ,84% 87,60% ,84% 88,44% ,79% 89,23% ,79% 90,02% ,79% 90,81% ,79% 91,59% ,78% 92,38% ,77% 93,15% ,73% 93,88% ,72% 94,60% 4A ,71% 95,32% ,67% 95,98% ,62% 96,60% ,60% 97,20% ,47% 97,67% ,31% 97,98% 1A ,26% 98,24% ,26% 98,50% ,26% 98,76% ,24% 99,00% 2A ,20% 99,20% ,19% 99,39% 5A ,16% 99,55% ,15% 99,70% ,15% 99,85% 3A ,15% 100,00%
4 Component Target Package 1 Package 2 Package 3 Package 4 Package 5 Package 6 Package 7 Overall results of the experimental evaluation of 7 different software packages. MS Engine Operating system Package N. MP NSMC % SQL Server 2005 Windows P ,5 76% Oracle 10g Red Hat Enterprise Linux ,5 68% Windows P % PostgreSQL 8 Red Hat Enterprise Linux % Windows P ,5 66% MySQL Community Edition 5 Red Hat Enterprise Linux % Windows P ,5 64% GAP ANALISYS MATRI The following table presents the complete gap analysis matrix of the 7 packages, not included in the paper. Security Mechanism (The package offers support for...) Disabling access to extended stored procedures and functions Config. the system to always encrypt a remote connection to the MS Encrypting the connection of developer applications Removing system privileges of MS userids Restricting read/write privileges of a partition to a specific userid Automated installation of MS pending patches Automated installation of pending patches Configuring the MS to store credential information using a reliable encryption scheme Configuring the to store credential information using a reliable encryption scheme Defining all MS passwords during the installation phase Defining all MS userids in the installation phase Defining all passwords during the installation phase Defining all userids during the installation phase Relying the MS on an outside specialized authentication mechanism Relying the on an outside specialized authentication mechanism Removing all privileges of users over all systems tables. Warning MS users, in a password change operation, that their new passwords are weak and cannot be accepted Warning users, in a password change operation, that their new passwords are weak and cannot be accepted A MS authentication procedure that requests only credential information to the remote users An authentication procedure for remote clients that identify individual end users instead of individual applications An authentication procedure that requests only credential information to the remote users Configuring the MS so only administrators have access to log
5 information Configuring the so only admins. have access to log information Configuring the system to drop idle connections after a specific period of inactivity Configuring the system to require that remote clients have the correct server certificate installed Denying login into the MS from a credential with more than a specified number of failed authentication attempts Denying login into the from a credential with more than a specified number of failed authentication attempts Forcing the MS users to change their passwords when they're older than a specified time frame Forcing the users to change their passwords when they're older than a specified time frame Identifying systems privileges of MS userids Setting read/write/execution privileges over files Setting that a userid cannot login Setting who can change configuration files Setting who can change environment variables Specifying privileges in a row/value level Using custom defined SSL certificates for encrypted connections Changing MS userids already in use Changing userids already in use Changing passwords of MS userids already in use Changing passwords of userids already in use Creating an userid with limited privileges Creating file systems partitions Identifying MS userids with default passwords Identifying default MS userids Identifying default userids Identifying userids with default passwords Identifying users with privileges over systems tables Making a backup copy of the database Making a backup copy of the which can be used to restore the environment to its current state Storing the backup in a custom storage place Testing the installation of MS new patches Testing the installation of new patches Using a privilege limited userid to successfully install the MS. Using a privilege limited userid to successfully load a MS process. Warning the admin that the last data backup is not up-to-date anymore Warning the administrator that the last backup is not up-to-date anymore Warning the administrator that there are MS vendor patches remaining to be applied Warning the administrator that there are vendor patches remaining to
6 be applied Allowing the A to not use ANY and ALL expressions Allowing to explicitly state that a particular privilege cannot be delegated Auditing a variety of important MS events Auditing data changes Blocking non-as from delegating their privileges Blocking privileges not inherited from groups/roles Blocking the usage of ANY and ALL expressions in privileges granting Changing listening TCP/UDP ports Changing remote identification information already in use. (e.g., SID) Config. the MS so only As have access to audited information Configuring the system to always establish connections through the same TCP/UDP ports during the installation phase. Configuring the system to always establish connections through the same TCP/UDP ports. Defining all remote identification information during the installation phase Defining listening TCP/UDP ports during the installation phase Disabling the generation of core_dump files Disabling the generation of trace files Encrypting backups with a reliable encryption algorithm Identifying available functions that interact with the operating system Preventing specifying sensitive information in configuration files. (e.g., not require specifying password in configuration files, etc.) Preventing the general use of sensitive information in systems variables Preventing the installation of a database example during installation Removing quotas over systems areas Setting and discarding a complex password for a userid Setting privileges to groups or roles Setting the owner of files Specifying important events which occur in the MS that should generate a finger print Specifying important events which occur in the that should generate a finger print Specifying privileges in a column level Specifying privileges in a database level Specifying privileges in a table level Warning MS users that their passwords are older than a specified time frame Warning users that their passwords are older than a specified time frame Warning the administrator if any important configuration or file was modified Writing procedures that generate a trace for data changes Creating stored procedures Creating views Disabling a network protocol
7 Identifying active protocols in the network stack Identifying available extended functions in general Identifying available functions that can be used to perform network operations Identifying available functions that can be used to read/write in the file system Identifying example databases Identifying users with quotas over systems areas Removing a database Selecting a different partition for log information Selecting a different partition than the main partition for auditing info Selecting a different partition than the main partition for MS log information Selecting a different partition than the main partition for the data files Setting/unsetting access privileges over peripherals Setting/unsetting read/write/execute privileges over files Testing if a recently created backup correctly restores the database data to its corresponding state Testing if a recently created backup correctly restores the system to its corresponding state Warning administrators of ANY and ALL expressions used in privileges assignments Warning admin of users with the power of delegating their privileges
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationHow to Configure Guest Access with the Ticketing System
How to Configure Guest Access with the Ticketing System Set up a login or ticketing system to temporarily grant access to guest users. Ticketing admins assign guest tickets to the users. The user credentials
More informationIT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery And Support Week Four - OS IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 What is an Operating System (OS)? OS is a software that designed to run on specific hardware
More informationHIPAA Controls. Powered by Auditor Mapping.
HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard
More informationEXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.
CompTIA EXAM - CAS-002 CompTIA Advanced Security Practitioner (CASP) Exam Buy Full Product http://www.examskey.com/cas-002.html Examskey CompTIA CAS-002 exam demo product is here for you to test the quality
More informationUnified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions
Unified Security Platform Security Center 5.4 Hardening Guide Version: 1.0 Innovative Solutions 2016 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes
More informationOracle Database Vault
Oracle Database Vault DBA Administrative Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 2 Database Administration Tasks Summary 3 General Database Administration Tasks 4 Managing
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 35 Integration Guideline Disclaimer Disclaimer of Warranties
More informationEnterSpace Data Sheet
EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions
More informationCombating Common Web App Authentication Threats
Security PS Combating Common Web App Authentication Threats Bruce K. Marshall, CISSP, NSA-IAM Senior Security Consultant bmarshall@securityps.com Key Topics Key Presentation Topics Understanding Web App
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
More informationW H IT E P A P E R. Salesforce Security for the IT Executive
W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login
More informationIT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao
IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationVMware vcloud Air SOC 1 Control Matrix
VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a
More informationMinfy MS Workloads Use Case
Contents Scope... 3 About CUSTOMER... Error! Bookmark not defined. Use Case Description... 3 Technical Stack... 3 AWS Architecture... Error! Bookmark not defined. AWS Solution Overview... 4 Risk Identified
More informationSecurity in the Privileged Remote Access Appliance
Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationINCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.
INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for
More informationMinfy MS Workloads Use Case
Contents Scope... 3 About Customer... 3 Use Case Description... 3 Technical Stack... 3 AWS Solution... 4 Security... 4 Benefits... 5 Scope This document provides a detailed use case study on Hosting GSP
More informationCIS Controls Measures and Metrics for Version 7
Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationBarracuda Networks NG Firewall 7.0.0
RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall
More informationSecurity Guidelines. AudioCodes One Voice Operations Center Product Suite OVOC. Version 7.4
Security Guidelines AudioCodes One Voice Operations Center Product Suite OVOC Version 7.4 Security Guidelines Contents Table of Contents 1 Introduction... 7 1.1 AudioCodes OVOC Security Solution... 7
More informationSecurity Guidelines. OVOC Product Suite OVOC. Version 7.6
Security Guidelines OVOC Product Suite OVOC Security Guidelines Version 7.6 Notice OVOC Security Guidelines Notice Information contained in this document is believed to be accurate and reliable at the
More informationHackproof Your Cloud Responding to 2016 Threats
Hackproof Your Cloud Responding to 2016 Threats Aaron Klein, CloudCheckr Tuesday, June 30 th 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Changing Your Perspective Moving
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationmaxecurity Product Suite
maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...
More informationCO MySQL for Database Administrators
CO-61762 MySQL for Database Administrators Summary Duration 5 Days Audience Administrators, Database Designers, Developers Level Professional Technology Oracle MySQL 5.5 Delivery Method Instructor-led
More informationMySQL for Database Administrators Ed 3.1
Oracle University Contact Us: 1.800.529.0165 MySQL for Database Administrators Ed 3.1 Duration: 5 Days What you will learn The MySQL for Database Administrators training is designed for DBAs and other
More informationThe Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide
The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationSolutions Business Manager Web Application Security Assessment
White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security
More informationOracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites
Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security
More informationEbook : Overview of application development. All code from the application series books listed at:
Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet
More informationApplication Control Review. August 4, 2012
Application Control Review August 4, 2012 Application Controls Review - Scope Web security Access Controls Password Controls Service Level Agreement Database Access Controls Perimeter Security Controls
More informationSMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide
SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015
More informationMicrosoft SQL Installation and Setup
This chapter provides information about installing and setting up Microsoft SQL. Encrypted Database Not Supported, page 1 Install and Setup Microsoft SQL Server, page 1 Database Migration Required for
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationIntro to PostgreSQL Security
Intro to PostgreSQL Security NordicPGDay 2014 Stockholm, Sweden Stephen Frost sfrost@snowman.net Resonate, Inc. Digital Media PostgreSQL Hadoop techjobs@resonateinsights.com http://www.resonateinsights.com
More informationAdvanced Security Measures for Clients and Servers
Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network
More informationPass Microsoft Exam
Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION
More informationCIS Controls Measures and Metrics for Version 7
Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update
More informationSoonr Updates to Services, Web UI and Agents October 2013
This document covers powerful new features being introduced for Soonr Workplace during October 2013. These improvements include the following new capabilities: Granular Share Permissions Updates to Soonr
More informationNSIF APPROVED DOCUMENT. Common Applications Requirements for SONET NE Security System
NSIF APPROVED DOCUMENT NSIF-037-2000 (NSIF Document #NSIF-CA-9910-110R3) WORK GROUP: Security TITLE: Common Applications Requirements for SONET NE Security System DATE: EDITOR: Name: Ron Roman Voice: (732)
More informationNiagara AX Security. Overview Westerre Parkway, Suite 350 Richmond, VA Ph: Fx:
Niagara AX Security Overview 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 Ph: 804.747.4771 Fx: 804.747.5204 www.tridium.com Niagara AX includes a comprehensive security model that provides a high
More informationSafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem
version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................
More informationReal Application Security Administration
Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application
More informationAccessData FTK Quick Installation Guide
AccessData FTK Quick Installation Guide Document date: May 20, 2014 2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system,
More informationReference manual Integrated database authentication
BUSINESS SOFTWARE Reference manual Integrated database authentication Installation and configuration ii This document is intended for Agresso Business World Consultants and customer Super Users, and thus
More informationOracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999
Advanced Security: Enterprise User Management An Technical White Paper Advanced Security: Enterprise User Management THE CHALLENGES OF USER MANAGEMENT Some of the challenges faced by an enterprise today
More informationCDP Data Center Console User Guide CDP Data Center Console User Guide Version
CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationA Survey of Access Control Policies. Amanda Crowell
A Survey of Access Control Policies Amanda Crowell What is Access Control? Policies and mechanisms that determine how data and resources can be accessed on a system. The Players Subjects Objects Semi-objects
More informationJérôme Kerviel. Dang Thanh Binh
Dang Thanh Binh Jérôme Kerviel Rogue trader, lost 4.9 billion Largest fraud in banking history at that time Worked in the compliance department of a French bank Defeated security at his bank by concealing
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationOracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide
Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated
More informationOracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
More informationIPM Secure Hardening Guidelines
IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationStorage Manager 2018 R1. Installation Guide
Storage Manager 2018 R1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either
More informationmacos Security Checklist:
WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features
More informationNetwrix Auditor. Administration Guide. Version: /31/2017
Netwrix Auditor Administration Guide Version: 9.5 10/31/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationCOPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51
Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual
More informationPCI DSS and the VNC SDK
RealVNC Limited 2016. 1 What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) compliance is mandated by many major credit card companies, including Visa, MasterCard, American Express,
More informationHikCentral V1.3 for Windows Hardening Guide
HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote
More informationQuickStart Guide for Managing Computers. Version
QuickStart Guide for Managing Computers Version 10.6.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100
More informationIT Services IT LOGGING POLICY
IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and
More informationMorningstar ByAllAccounts Service Security & Privacy Overview
Morningstar ByAllAccounts Service Security & Privacy Overview Version 3.8 April 2018 April 2018, Morningstar. All Rights Reserved. 10 State Street, Woburn, MA 01801-6820 USA Tel: +1.781.376.0801 Fax: +1.781.376.8040
More informationPerceptive TransForm E-Forms Manager
Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationTechnology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x
Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x Updated 07/09/2018 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x With the release of ER/Studio
More informationISA 2006 and OWA 2003 Implementation Guide
ISA 2006 and OWA 2003 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationNovi Survey Installation & Upgrade Guide
Novi Survey Installation & Upgrade Guide Introduction This procedure documents the steps to create a new install of Novi Survey and to upgrade an existing install of Novi Survey. After an install is created,
More informationHikCentral V.1.1.x for Windows Hardening Guide
HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote
More informationOracle Database Security and Audit. Authentication and authorization
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Authentication and authorization Copyright 2014, Learning objectives Understand authentication Understand authorization Understand the
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationOperational Reporting Web Viewer Installation and Users Guide
Operational Reporting Web Viewer Installation and Users Guide Table of Contents Disclaimer... 3 What is Operational Reporting Web Viewer?... 4 Installation Requirements... 5 Installation Instructions...
More informationMySQL for Database Administrators Ed 4
Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals
More informationMongoDB Security Checklist
MongoDB Security Checklist Tim Vaillancourt Sr Technical Operations Architect, Percona Speaker Name `whoami` { name: tim, lastname: vaillancourt, employer: percona, techs: [ mongodb, mysql, cassandra,
More informationJohn Heimann Director, Security Product Management Oracle Corporation
John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE
More informationStonesoft Management Center. Release Notes for Version 5.6.1
Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...
More informationSophos Enterprise Console
quick startup guide Product Version: 5.5 Contents About this guide... 1 What do I install?...2 What are the key steps?... 3 Download the Enterprise Console installer...4 If you have a Sophos license...
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based
More informationJuly 2018 These release notes provide information about the The Privileged Appliance and Modules release.
July 2018 These release notes provide information about the The Privileged Appliance and Modules release. About this release TPAM automates, controls and secures the entire process of granting administrators
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and
More informationAudBase Security Document Page 0. Maintaining Data Security and Integrity
AudBase Security Document Page 0 1 1 Maintaining Data Security and Integrity 1 1 AudBase Security Document Page 1 There are many aspects relating to data security and patient confidentiality. There is
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationmacos Security Checklist:
WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is
More informationSophos Firewall Configuring SSL VPN for Remote Access
Sophos Firewall Configuring SSL VPN for Remote Access Product Version: 1 Document date: October 2014 Contents 1 Introduction 3 2 Configuring Sophos Firewall 4 2.1 Defining a User Account 4 2.2 Configuring
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationAre You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus
Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus 1 60 Second AWS Security Review 2 AWS Terminology Identity and Access Management (IAM) - AWS Security Service to manage
More informationPerceptive Data Transfer
Perceptive Data Transfer Installation and Setup Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International,
More informationData Security and Privacy. Unix Discretionary Access Control
Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationRSA Identity Governance and Lifecycle
RSA Identity Governance and Lifecycle Supplemental Administrative Guidance V7.0.1 Contents Introduction... 3 Intended Audience... 3 References... 3 Evaluated Configuration of the TOE... 4 Installation
More information