Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/6/2009
04:55 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Database Administrators Playing Increasingly Crucial Role In Security

Long left out of the security picture, DBAs now find themselves performing key tasks in the enterprise

[Excerpted from The Database Administrator's Guide To Security, a new report published today in Dark Reading's Database Security Tech Center.]

In the past, database administrators weren't expected to do much with security. Their focus was on the speed, performance, and accuracy of the data. Security was a relatively low priority.

Recently, however, that prioritization has begun to shift. The number of structured information stores is mushrooming within the enterprise. The value of the data increases as businesses share it with customers and partners. Regulators and auditors are taking a hard look at who has access to database information. And financially motivated hackers are salivating at the prospect of breaking into these concentrated -- and potentially lucrative -- repositories of data.

All of these trends are converging to form one universal truth of data protection: DBAs can no longer ignore security. Like their administrative counterparts in Windows and networking environments, DBAs must finally knuckle down and count security as a vital part of their jobs.

"In the Windows world it was not acceptable even years ago to be using default passwords on accounts or to let systems go unpatched," says Alexander Kornbrust, CEO of Red-Database-Security, a consultancy that specializes in securing Oracle databases. "But in the database world, people are still using default passwords, and they're still using outdated databases."

The scary fact is that, at the moment, more than one-quarter of Oracle shops still take more than six months to patch their databases, according to a recent poll conducted by the Independent Oracle Users Group. And the use of default passwords is so prevalent that "there are worms out there with automated scanners that are just looking for default administrative credentials on old systems," says Rich Mogull, founder of Securosis, a security consulting firm.

While the security team certainly plays a major factor in shoring up the defenses of enterprise databases, all of its work won't help much if DBAs don't lay the necessary risk mitigation groundwork first, experts say. In addition to improving patch management and password management practices, DBAs can help by taking the right steps in configuration management.

"Figuring out if you have the right privileges on certain tables is completely outside the scope of a network vulnerability scan," says Phil Neray, vice president of strategy for Guardium, a database security tool vendor. "The DBAs need to go and make sure the privileges are right -- not just for the items in the database, but also for files and executables outside the database."

DBAs also play a role in "database hardening," which includes the removal of unused applications, packages, and functions that could introduce unwanted vulnerabilities within the database. For example, Kornbrust says, simply revoking three particularly dangerous packages from Oracle -- DBMS_SQL, UTL_TCP, and DBMS_XMLGEN -- can drastically reduce an organization's attack surface.

In addition, DBAs can help security and compliance team members by implementing some database encryption. The important thing, experts say, is to remember that encryption alone will not solve security problems.

"Encrypt to satisfy regulation, not to provide control and not to prevent attacks," says Pete Lindstrom research director for Spire Security, "because the jury is out whether that is worth it."

To read more about what DBAs can do to aid in security -- and how -- click here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-21269
PUBLISHED: 2020-10-27
checkpath in OpenRC through 0.42.1 might allow local users to take ownership of arbitrary files because a non-terminal path component can be a symlink.
CVE-2020-27743
PUBLISHED: 2020-10-26
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
CVE-2020-1915
PUBLISHED: 2020-10-26
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application usi...
CVE-2020-26878
PUBLISHED: 2020-10-26
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
CVE-2020-26879
PUBLISHED: 2020-10-26
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.