Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/6/2009
04:55 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Database Administrators Playing Increasingly Crucial Role In Security

Long left out of the security picture, DBAs now find themselves performing key tasks in the enterprise

[Excerpted from The Database Administrator's Guide To Security, a new report published today in Dark Reading's Database Security Tech Center.]

In the past, database administrators weren't expected to do much with security. Their focus was on the speed, performance, and accuracy of the data. Security was a relatively low priority.

Recently, however, that prioritization has begun to shift. The number of structured information stores is mushrooming within the enterprise. The value of the data increases as businesses share it with customers and partners. Regulators and auditors are taking a hard look at who has access to database information. And financially motivated hackers are salivating at the prospect of breaking into these concentrated -- and potentially lucrative -- repositories of data.

All of these trends are converging to form one universal truth of data protection: DBAs can no longer ignore security. Like their administrative counterparts in Windows and networking environments, DBAs must finally knuckle down and count security as a vital part of their jobs.

"In the Windows world it was not acceptable even years ago to be using default passwords on accounts or to let systems go unpatched," says Alexander Kornbrust, CEO of Red-Database-Security, a consultancy that specializes in securing Oracle databases. "But in the database world, people are still using default passwords, and they're still using outdated databases."

The scary fact is that, at the moment, more than one-quarter of Oracle shops still take more than six months to patch their databases, according to a recent poll conducted by the Independent Oracle Users Group. And the use of default passwords is so prevalent that "there are worms out there with automated scanners that are just looking for default administrative credentials on old systems," says Rich Mogull, founder of Securosis, a security consulting firm.

While the security team certainly plays a major factor in shoring up the defenses of enterprise databases, all of its work won't help much if DBAs don't lay the necessary risk mitigation groundwork first, experts say. In addition to improving patch management and password management practices, DBAs can help by taking the right steps in configuration management.

"Figuring out if you have the right privileges on certain tables is completely outside the scope of a network vulnerability scan," says Phil Neray, vice president of strategy for Guardium, a database security tool vendor. "The DBAs need to go and make sure the privileges are right -- not just for the items in the database, but also for files and executables outside the database."

DBAs also play a role in "database hardening," which includes the removal of unused applications, packages, and functions that could introduce unwanted vulnerabilities within the database. For example, Kornbrust says, simply revoking three particularly dangerous packages from Oracle -- DBMS_SQL, UTL_TCP, and DBMS_XMLGEN -- can drastically reduce an organization's attack surface.

In addition, DBAs can help security and compliance team members by implementing some database encryption. The important thing, experts say, is to remember that encryption alone will not solve security problems.

"Encrypt to satisfy regulation, not to provide control and not to prevent attacks," says Pete Lindstrom research director for Spire Security, "because the jury is out whether that is worth it."

To read more about what DBAs can do to aid in security -- and how -- click here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16966
PUBLISHED: 2019-10-21
An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on...
CVE-2019-9491
PUBLISHED: 2019-10-21
Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
CVE-2019-16964
PUBLISHED: 2019-10-21
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any comma...
CVE-2019-16965
PUBLISHED: 2019-10-21
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.
CVE-2019-18203
PUBLISHED: 2019-10-21
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.