IBM Infosphere Guardium - Database Security
-
Upload
ebuc -
Category
Technology
-
view
2.616 -
download
4
description
Transcript of IBM Infosphere Guardium - Database Security
![Page 1: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/1.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance
![Page 2: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/2.jpg)
© 2010 IBM Corporation
SQL injection played a role in 79% of records compromised
during 2009 breaches
“Although much angst and security funding is given to …. mobile
devices and end-user systems, these assets are simply not
a major point of compromise.”
Database Servers Are The Primary Source of Breached Data
2010 Data Breach Report from Verizon Business RISK Team http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf
Source of Breached Records
… up from 75% in 2009 Report
![Page 3: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/3.jpg)
© 2010 IBM Corporation
Information Management
Perimeter defenses no longer sufficient
A fortress mentality will not work in cyber. We cannot retreat
behind a Maginot Line of firewalls.
-- William J. Lynn III, U.S. Deputy Defense Secretary
Outsourcing
Web-Facing Apps
Employee Self-Service,
Partners & Suppliers
Insiders (DBAs, developers,
outsourcers, etc.)
Stolen Credentials
(Zeus, etc.)
![Page 4: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/4.jpg)
© 2010 IBM Corporation
Information Management
Typical home-grown solutions are costly and ineffective
Create reports
Manual review
Manual remediation dispatch and tracking
Significant labor cost to review data and maintain process
High performance impact on DBMS from native logging
Not real time
Does not meet auditor requirements for Separation of Duties
Audit trail is not secure
Inconsistent policies enterprise-wide
Native Database Logging
Pearl/Unix Scripts/C++
Scrape and parse the data
Move to central repository
Native Database Logging
Native Database Logging
Native Database Logging
![Page 5: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/5.jpg)
© 2010 IBM Corporation
Information Management
InfoSphere Guardium continues to demonstrate its leadership …
2011
Source: The Forrester Wave™: Database Auditing And Real-Time Protection, Q2 2011, May 6, 2011. The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based
on best available resources. Opinions reflect judgment at the time and are subject to change.
![Page 6: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/6.jpg)
© 2011 IBM Corporation
IBM Security Solutions
6
What We Offer?
Database User Activity Monitoring
- Auditing and reporting
- Enforcing database user access
- Prevention (blocking)
Data Privacy
- Masking non-production data
- Encryption for production data
- Redaction for documents
Vulnerability Assessment
![Page 7: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/7.jpg)
© 2010 IBM Corporation
Information Management
Collector
Real time database monitoring and protection with InfoSphere Guardium
No DBMS or application changes
Does not rely on DBMS-resident logs that can
easily be erased by attackers, rogue insiders
100% visibility including local DBA access
Minimal performance impact
Cross-DBMS solution
Granular, real-time policies & auditing
–Who, what, when, how
Automated compliance reporting, sign-
offs and escalations (financial
regulations, PCI DSS, data privacy
regulations, etc.)
Host-based
Probes (S-TAPs)
![Page 8: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/8.jpg)
© 2010 IBM Corporation
Information Management
![Page 9: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/9.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Architecture
![Page 10: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/10.jpg)
© 2010 IBM Corporation
Information Management
![Page 11: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/11.jpg)
© 2011 IBM Corporation
IBM Security Solutions
Scalable Multi-Tier Architecture
Integration with LDAP,
IAM, SIEM, IBM TSM,
BMC Remedy, …
Oracle on
Linux for
System z
![Page 12: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/12.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 13: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/13.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 14: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/14.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 15: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/15.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 16: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/16.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 17: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/17.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 18: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/18.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 19: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/19.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 20: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/20.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 21: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/21.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 22: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/22.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Installation
![Page 23: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/23.jpg)
© 2010 IBM Corporation
Information Management
![Page 24: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/24.jpg)
© 2010 IBM Corporation
Information Management
![Page 25: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/25.jpg)
© 2010 IBM Corporation
Information Management
![Page 26: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/26.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Data Base Auto Discovery (DBAD)
![Page 27: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/27.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 28: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/28.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 29: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/29.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Security Policy & Reporting
![Page 30: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/30.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 31: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/31.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 32: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/32.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 33: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/33.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 34: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/34.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 35: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/35.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 36: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/36.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 37: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/37.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Classifier
![Page 38: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/38.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 39: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/39.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 40: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/40.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 41: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/41.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Real Time & Correlation Alerts
![Page 42: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/42.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 43: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/43.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 44: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/44.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 45: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/45.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium S-GATE
![Page 46: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/46.jpg)
© 2010 IBM Corporation
![Page 47: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/47.jpg)
© 2010 IBM Corporation
![Page 48: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/48.jpg)
© 2010 IBM Corporation
![Page 49: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/49.jpg)
© 2010 IBM Corporation
![Page 50: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/50.jpg)
© 2010 IBM Corporation
![Page 51: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/51.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Quarantine & Redact
![Page 52: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/52.jpg)
© 2010 IBM Corporation
![Page 53: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/53.jpg)
© 2010 IBM Corporation
![Page 54: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/54.jpg)
© 2010 IBM Corporation
![Page 55: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/55.jpg)
© 2010 IBM Corporation
![Page 56: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/56.jpg)
© 2010 IBM Corporation
![Page 57: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/57.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Configuration Audit System (CAS)
![Page 58: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/58.jpg)
© 2010 IBM Corporation
![Page 59: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/59.jpg)
© 2011 IBM Corporation
IBM Security Solutions
![Page 60: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/60.jpg)
© 2010 IBM Corporation
![Page 61: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/61.jpg)
© 2010 IBM Corporation
![Page 62: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/62.jpg)
© 2010 IBM Corporation
![Page 63: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/63.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Vulnerability Assesment
![Page 64: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/64.jpg)
© 2010 IBM Corporation
![Page 65: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/65.jpg)
© 2010 IBM Corporation
![Page 66: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/66.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Entitlement Reports
![Page 67: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/67.jpg)
© 2010 IBM Corporation
![Page 68: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/68.jpg)
© 2010 IBM Corporation
![Page 69: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/69.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Application User Identification
![Page 70: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/70.jpg)
© 2010 IBM Corporation
![Page 71: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/71.jpg)
© 2010 IBM Corporation
![Page 72: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/72.jpg)
© 2010 IBM Corporation
![Page 73: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/73.jpg)
© 2010 IBM Corporation
![Page 74: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/74.jpg)
© 2010 IBM Corporation
![Page 75: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/75.jpg)
© 2010 IBM Corporation
![Page 76: IBM Infosphere Guardium - Database Security](https://reader035.fdocuments.in/reader035/viewer/2022081715/54b77b7b4a795938168b4611/html5/thumbnails/76.jpg)
© 2010 IBM Corporation
Information Management
IBM InfoSphere Guardium Paldies par uzmanību!