Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

11/4/2009
11:20 AM
Adrian Lane
Adrian Lane
Commentary
50%
50%

What DAM Does

Database activity monitoring (DAM) tools have a range of capabilities, including data collection and analysis. But the real question is: How does this technology help you?

Database activity monitoring (DAM) tools have a range of capabilities, including data collection and analysis. But the real question is: How does this technology help you?No one is looking for a generic tool; rather, they are looking for a cost-effective solution for some business problem. And in this economy, it had better save time and money as well. So how do you apply database activity monitoring to solve business problems? There are three common use cases:

Security: The collection of all SQL activity inside and outside the database offers a unique form of event correlation that, when coupled with real time analysis, provides extraordinary security event notification. Failed logins, administrative activity, SQL injection detection, blocking unwanted statements, alteration of user privileges, and use of stored procedures are common security features built into DAM platforms. Access control systems, SIEM, and WAF technologies can offer many of these features, but not all at once -- and not from a single product.

Database Operations: Changes to database applications are complex, often comprised of hundreds of individual steps, with the ultimate result not evident from any single action. These include changes to platform function, to database structure, installation of patches, backup and recovery detection, change order verification, resource allocation issues, business process failures and in some cases, database and vulnerability detection. Transactional analysis of these common database administrative tasks are built into database monitoring and auditing tools, and can feed the results into other management applications.

Compliance: It's beyond the skill of most auditors to find information within a database, but separation of duties demands information collection and policy analysis be independent of DBA's and IT administrators. Change order verification, audit trail production, user permissions changes, and control validation are typical requirements. Collection of database audit and access trails provides control verification. Sarbanes-Oxley and other financial regulations require a complete and accurate picture of transactions, while PCI compliance mandates data usage reports on credit card related data. These are native capabilities to DAM, providing a neutral platform for policy deployment, analysis, and reporting. Solving database security problems was the genesis of the DAM market, but compliance is what drives adoption of the technology today. While there is some overlap with other security and management platforms, DAM offers features and functions found nowhere else.

Most vendors pre-package thousands of compliance and security polices, both saving time in the development of these rules and providing database analysis capabilities to non-database experts.

While compliance is the driver, business justification for DAM products comes from the sum of these capabilities to automates security, compliance, and operational management tasks, and the flexibility to adapt to many environments.

Adrian Lane is an analyst/CTO with Securosis LLC, an independent security consulting practice. Special to Dark Reading. Adrian Lane is a Security Strategist and brings over 25 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and secure software development. With experience at Ingres, Oracle, and ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.