SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR SARBANES OXLEYANDCOBIT

Similar documents
SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

ARE YOU READY FOR GDPR?

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

QuickBooks Online Security White Paper July 2017

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. EventTracker 8815 Centre Park Drive, Columbia MD 21045

SQL Server Solutions GETTING STARTED WITH. SQL Secure

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Sponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam

Database Centric Information Security. Speaker Name / Title

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

Subject: University Information Technology Resource Security Policy: OUTDATED

ALERT LOGIC LOG MANAGER & LOG REVIEW

Secret Server HP ArcSight Integration Guide

with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

VANGUARD POLICY MANAGERTM

ISO27001 Preparing your business with Snare

MEETING ISO STANDARDS

POLICY MANAGER VANGUARD POLICY MANAGER (AUDIT/COMPLIANCE)

VANGUARD Policy Manager TM

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Virtual Machine Encryption Security & Compliance in the Cloud

White Paper. Complying with SOX Regulations Using the Exabeam Security Intelligence Platform

USING QUALYSGUARD TO MEET SOX COMPLIANCE & IT CONTROL OBJECTIVES

SOX/COBIT Framework. and Netwrix Auditor Mapping. Toll-free:

ISO 27002: 2013 Audit Standard Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD ISO 27002

Automating the Top 20 CIS Critical Security Controls

FDIC InTREx What Documentation Are You Expected to Have?

Cybersecurity & Privacy Enhancements

Security Architecture

Comprehensive Database Security

Privileged Account Security: A Balanced Approach to Securing Unix Environments

WORKSHARE SECURITY OVERVIEW

Clearing the Path to PCI DSS Version 2.0 Compliance

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

EMC Ionix IT Compliance Analyzer Application Edition

SANS Institute Product Review: Oracle Database Vault

The Convergence of Security and Compliance

Cloud FastPath: Highly Secure Data Transfer

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

SARBANES-OXLEY (SOX) ACT

Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk

Sarbanes-Oxley Act (SOX)

Texas A&M University: Learning Management System General & Application Controls Review

Tracking and Reporting

WHITEPAPER. THE INGRES DATABASE AND COMPLIANCE Ensuring your business most valuable assets are secure

General Information System Controls Review

Securities Industry Association Sarbanes Oxley from the IT Practitioner s Point of View. October, 2004

SIEMLESS THREAT MANAGEMENT

Cyber Security Program

<Insert Picture Here> Oracle Database Security

the SWIFT Customer Security

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

Cyber Risks in the Boardroom Conference

Effective COBIT Learning Solutions Information package Corporate customers

SECURITY & PRIVACY DOCUMENTATION

Assessment and Compliance with Sarbanes-Oxley (SOX) Requirements DataGuardZ Whitepaper

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

PROTECT AND AUDIT SENSITIVE DATA

SQL Server Whitepaper

A company built on security

WHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

Demonstrating Compliance in the Financial Services Industry with Veriato

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Ensuring System Protection throughout the Operational Lifecycle

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Audit Vault Implementation

Best Practices for Deployment of SQL Compliance Manager

Agenda. Introduction. Key Concepts. The Role of Internal Auditors. Business Drivers Identity and Access Management Background

Understanding IT Audit and Risk Management

Position Description IT Auditor

A Security Admin's Survival Guide to the GDPR.

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security

SoftLayer Security and Compliance:

A Comprehensive Guide to Remote Managed IT Security for Higher Education

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Global Security Consulting Services, compliancy and risk asessment services

Overview. Business value

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

COMPLIANCE BRIEF: NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY S FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

Compliance and Privileged Password Management

Sarbanes-Oxley and Its Impact on IT Organizations

Oracle Database Auditing

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Compliance with CloudCheckr

Aligning Your Organization s Business Units to Achieve a Cohesive Cybersecurity Strategy

White Paper Server. Five Reasons for Choosing SUSE Manager

Network Security Whitepaper. Good Security Policy Ensures Payoff from Your Security Technology Investment

Balancing Between Risk and Compliance

26 February Office of the Secretary Public Company Accounting Oversight Board 1666 K Street, NW Washington, DC

Cyber Security For Business

Lakeshore Technical College Official Policy

Clearing the Path to PCI DSS Version 2.0 Compliance

Teradata and Protegrity High-Value Protection for High-Value Data

Business Continuity An Integral Part of Risk Management At Constellation Energy

Transcription:

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR SARBANES OXLEYANDCOBIT

Microsoft SQL Server database security guidelines are defined by the following JUST tools HOW and TRUE IS organizations: Center for Internet Security (CIS), Microsoft Best Practices Analyzer TRUE (MSBPA) CDP? and the Database Security Technical Implementation Guide (STIG). They all provide guidance for From Idera s viewpoint, true CDP ensuring that access to your SQL Server is auditable, secure and consistent. These must offer guidelines no more than one-second offer recommendations to comply with federal regulations like Sarbanes-Oxley granularity (SOX) Section between recovery points, which pretty much restricts true CDP to 404 as well as industry best practices such as the Control Objectives for Information and Related a Storage Area Network (SAN). Further, Technology (COBIT ) framework. These regulations mandate that IT define the true right CDP business is more or less limited to disciplines and good practices for SQL Server database access in order to prevent streaming-type internal and applications, and is not relevant for most servers, which external intrusions and for enhancing database confidentiality, data integrity and availability. tend to be transaction or file oriented emails, documents, database, all of these end up as File System I/O. True In order to define the proper baselines, track the changes and report those findings to auditors CDP applications do not see changes and regulators, you must be able answer the following questions: written to the SAN until the operating system flushes its disk cache. Without getting into an overlong technical explanation, in order to really live up to the promise of being true CDP, the disk cache would have to be flushed after every change, which will seriously 1. Who has access to my SQL Server systems and data? degrade performance. Practically speaking, then, true CDP does not end up operating in reallife with one second granularity. 2. How do I define a secure baseline and maintain it across my SQL Server environment? Meanwhile, near CDP incorporates 3. What has changed with SQL Server permissions, logins & access? user-scheduled synchronizations. Realistically, these can be performed every 15 minutes, which minimizes the 4. How can I implement repeatable processes to help maintain the security chance for standards? data loss without losing any performance. 5. What is the best way for me to ensure not only ongoing compliance with federal regulations and standards but also help maintain reasonable security across my SQL Server databases?

HOW DOES SQL SECURE ADDRESS AUTHOR BIO THESE REQUIREMENTS? Randy M. Bowie Senior Director of Engineering A key course of action to comply with federal regulations is developing, maintaining and enforcing internal controls and procedures for your IT environment. IDERA SQL Secure is a necessary Randy tool Bowie for joined the Idera Server Backup team in 2012, bringing establishing the right controls to meet those regulations. SQL Secure is a security analysis solution that expertise in the delivery of solutions identifies SQL Server security access violations and ensures security policies are enforced. the You IT can enterprise. Randy is currently find out who has access to what and identify each user s effective rights across all SQL responsible Server objects. for the research and Furthermore, you can also alert on violations of your corporate policies, and secure your development environment organization at Idera. (internally and externally) from the most common methods of intrusion. Randy has spent the past 13 years working with the best teams in the SQL Secure helps IT organizations address the requirements of SOX and COBIT where industry they apply at Idera, NetIQ, and PentaSafe to Microsoft SQL Server. SQL Secure helps you to define your SQL Server baselines by to providing deliver award three winning solutions IDERA-defined templates (Level-1 Basic, Level-2 Balanced, Level-3 Strong) which provide for realistic security, guidelines systems management, configuration control and compliance. for establishing the right security checks for your environment. In addition, it can also extract your permission settings from any point in time, and identify any changes or vulnerabilities that Randy may holds exist. a This Master of Science with gives you the power to proactively address those exceptions before reports are delivered emphasis to your on auditors. Mechanical Engineering from the University of Mississippi where he studied computational fluid dynamics. HOW DOES SQL COMPLIANCE MANAGER ADDRESS THESE REQUIREMENTS? SQL Compliance Manager is a comprehensive Microsoft SQL Server auditing solution that uses policy-based algorithms to track changes to your SQL Server objects and data. SQL Compliance Manager answers the questions pertaining to who did what, when, where and how across your SQL Server environment. Furthermore, SQL Compliance Manager delivers real-time monitoring and auditing of all data access, before and after updates, schema modifications and permission changes. SQL Compliance Manager provides alerts to inform you about who has accessed your data and delivers the reports that auditors demand! With SQL Compliance Manager you can comply with the Sarbanes-Oxley Section 404 regulation and the COBIT objectives. On the next page is a chart that details Sarbanes Oxley Section 404 objectives and shows how SQL Secure and SQL Compliance Manager help you to comply.

Sarbanes-Oxley Summary IDERA SOLUTIONS Section 404 A statement of management s responsibility for establishing and maintaining an adequate internal control structure and procedures for financial reporting; and management s assessment, as of the end of the company s most recent fiscal year of the effectiveness of the company s internal control structure and procedures for financial reporting, Section 404 requires the company s auditor to attest to and report on management s assessment of the effectiveness of the company s internal controls and procedures for financial reporting in accordance with standards established by the Public Company Accounting Oversight Board. (Source: Securities and ExchangeCommission.) AUTHOR BIO SQL Secure extracts existing login and access Randy M. Bowie information, and provides a score card report Senior Director of Engineering identifying potential problems. The tool provides saved snapshots Randy Bowie that report joined on the what Idera the Server SQL Server access Backup settings team are in 2012, at a particular bringing point in time. It also expertise elivers in an the assessment delivery of solutions feature that identifies for the changes IT enterprise. in permissions, Randy is logins, currently responsible for the research and configuration, access, surface area and data development organization at Idera. integrity and also provides reports for the auditors. SQL Randy Compliance has spent Manager the past 13 provides years a means to working track all with access the best to SQL teams Server in the data and objects industry which at make Idera, it a NetIQ, key component and PentaSafe for establishing to deliver the award right internal winning controls solutions and for security, systems management, procedures that auditors demand. configuration control and compliance. Randy holds a Master of Science with emphasis on Mechanical Engineering from the University of Mississippi where he studied computational fluid For the process-based COBIT framework, IDERA solutions can help in the following areas to ensure dynamics. that all intrinsic quality, contextual quality, and accessibility/security enabler goals are met: SQL Secure helps IT to define the right levels of protection against database intrusion and ensures that the right security checks are in place. An assessment can be run at any time to provide a detailed view of SQL Server settings to ensure that the system setup is in compliance with the standards determined by the IT department or external regulations. All users of SQL Server (internal, external and temporary) can be uniquely identifiable with SQL Secure. Should their access or permissions change, an assessment can be run to identify those changes. All assessments are stored in a secure repository for future assessments and reporting. Once changes are approved and implemented, SQL Secure can confirm those changes. Users can be easily identified and their access rights can be enforced. Furthermore, SQL Compliance Manager monitors and audits all user activity to the SQL Server data and objects. SQL Secure provides a means to confirm that employees who are granted or revoked access rights are validated and documented. Employees who are no longer with the organizations are easily identified. All access rights for all users are identified, documented and stored in the SQL Secure repository. The user can run reports on a periodic basis to confirm the permissions of all accounts and related privileges. SQL Secure helps you to define the right security settings to your SQL Server with IDERA-defined security checks. It also provides you with snapshot and assessment features to identify any abnormalities. In addition, SQL Compliance Manager can detect any changes in data and objects in real time. Abnormalities like failed logins for any selected database can be detected. Access to the SQL Secure repository is controlled by strict segregation-of-duties to administer user access. SQL Secure also helps to expose any security holes that may exist on your server. SQL Compliance Manager also provides a tamper-proof repository that can additionally send an alert if it is tampered with by an unauthorized user.

SOLUTION SUMMARY Complying with the Sarbanes Oxley Section 404 regulation is no easy task. The same holds true for IT organizations that leverage the good practices of the COBIT framework. The bottom line is that you must establish the right baselines for Microsoft SQL Server permissions and be able to identify the changes. You must also be able to track changes to SQL Server, alert on any anomalies and deliver reports to the auditors. The combination of SQL Secure and SQL Compliance Manager provides immutable proof to auditors that SQL Server permissions are established and monitored, as well as changes to data and database objects. IDERA s compliance solutions deliver the comprehensive reporting that auditors and regulators require. IDERAs compliance solutions help you to solidify and protect your SQL Server environment from intrusions and failed audits, which are costly and have an adverse effect on your business. You must develop, maintain and enforce the internal controls and procedures for a more secure SQL Server environment. Demonstrate compliance, protect your data, and most of all, prove it! IDERA understands that IT doesn t run on the network it runs on the data and databases that power your business. That s why we design our products with the database as the nucleus of your IT universe. Our database lifecycle management solutions allow database and IT professionals to design, monitor and manage data systems with complete confidence, whether in the cloud or on-premises. We offer a diverse portfolio of free tools and educational resources to help you do more with less while giving you the knowledge to deliver even more than you did yesterday. Whatever your need, IDERA has a solution.