Security Basics mailing list archives

Re: security against dba´s


From: Andre Rodrigues <acastanheira2001 () yahoo com br>
Date: Thu, 12 Feb 2009 09:18:44 -0800 (PST)

Adam,

There´s no particular duties, the dba mates do all the related job.

Maybe I will sugest an audit loging of production data access.

In the near future I will try to implement a cryptographic infra structure to deal with sensible data.

What else?

Thanks,
André


--- On Thu, 2/12/09, Adam Pal <pal_adam () gmx net> wrote:

From: Adam Pal <pal_adam () gmx net>
Subject: Re: security against dba´s
To: acastanheira2001 () yahoo com br, rohnskii () gmail com, security-basics () securityfocus com
Date: Thursday, February 12, 2009, 8:11 AM
Hi,


Do you have one DBA for sensitive assets? Usualy, when its
about sensitive information in the DB, there are 2 DBAs,
then you can implement a dual control with a shared password
(priciple of shared knowledge).



regards,
Adam Pal


-------- Original-Nachricht --------
Datum: Thu, 12 Feb 2009 05:57:35 -0800 (PST)
Von: Andre Rodrigues
<acastanheira2001 () yahoo com br>
An: security-basics () securityfocus com,
rohnskii () gmail com
Betreff: Re: security against dba´s

Hi,

You said that it is natural, as a DBA, to read
production in your
terminal. 
Do you really need to read the data?

Suppose it is employee´s salary data, or other
sensitive data.

You can e-mail the READ data, instead of downloading
to an USB device. But
I can´t prevent the DBA´s from accessing the e-mail
account.

The other guys on this list replied that I should
encrypt the sensible
data. Doing this, the criptgrafic keys should be
managed by the security team,
correct?




Thanks,
André

--- On Wed, 2/11/09, rohnskii () gmail com
<rohnskii () gmail com> wrote:

From: rohnskii () gmail com
<rohnskii () gmail com>
Subject: Re: security against dba´s
To: security-basics () securityfocus com
Date: Wednesday, February 11, 2009, 1:54 PM
re your points:

1- inform all employees, not just DBA
2.1- log all access, not just DBA
2.2- what sort of access

Look, if you don't trust your DBA's,
hire/promote
someone you can trust.

Another part of the access you should monitor is
separate
from just the CRUD access to, and monitored by,
the DB. 
Track files/data downloaded to USB devices, in
other words
network endpoint control (NAC).

For example, it could be natural for me as a DBA
to Read
production to my terminal.  But it is probably
NOT natural
for me to download the READ data to a USB device.

Again, that type of access control should not be
exclusive
to DBA, it should be corporate wide.


      

-- 
Jetzt 1 Monat kostenlos! GMX FreeDSL - Telefonanschluss +
DSL 
für nur 17,95 Euro/mtl.!*
http://dsl.gmx.de/?ac=OM.AD.PD003K11308T4569a





Current thread: