380 likes | 456 Views
Practical Security: Balancing the Business. Oracle Corporation. David Knox Chief Security Engineer North American Sales. What, me worry?. $25 Million Penalty Assessed Against Riggs Bank May 15, 2004. Former AOL Employee Pleads Guilty in Customer Data Theft February 7, 2005.
E N D
Practical Security: Balancing the Business Oracle Corporation David Knox Chief Security Engineer North American Sales
$25 Million Penalty Assessed Against Riggs Bank May 15, 2004 Former AOL Employee Pleads Guilty in Customer Data Theft February 7, 2005 AmSouth Faces $10M Penalty October 13, 2004 PayPal eMail Addresses Exposed in Attack January 24, 2005
30,704 Average hours a company will spend on Section 404 (SOX) compliance
$5.1M Average cost of Sarbanes-Oxley compliance for a large U.S. company
$11.5M Average cost for Healthcare provider to meet HIPAA compliance
125 Non-frivolous lawsuits for Fortune 500 company at any given time
$10M Fine against six securities firms for not producing e-mails for SEC
10 x Cost for compliance by taking one-off versus integrated approach to compliance projects
145,000 Number of personal identities compromised in Choice Point “incident”
“If you spend more on coffee than on IT security, then you will be hacked…what's more, you deserve to be hacked!” Richard Clarke, 2002Special Advisor to the President, Cyberspace Security
Two Sides Operational Objectives Risk Policy makers, Security weenies Administrators, Developers, Users
Issues & Concerns Intellectual capital Financial Losses Asset Protection Brand Protection Public Image Litigation Business Risks Compliance Employee & Customer Privacy Loss of Customer Trust Source: Cybersecurity: It’s Dollars and Cents Business Week 2/11/2005
Protected Enterprise Challenges • Reduce risk and liability • Address Regulatory Compliance • Ensure privacy and accountability • Maintain operational effectiveness Business Information Security Continuity • Identification (who) • Access Controls (what) • Auditing (where, when & how) • High Availability • Disaster Recovery • Continuous Operations Applies to ALL applications across ALL industries
X Alerts Predictive Modeling Y Z Interactive Applications Portals 1. As data is consolidated it is more usable and less costly to manage 2. Availability and Security are now more important ETL, Web Services, Integration
Security is a System SECURITY Product Configuration Implementation Policy and Process
Security Realms • Policies • Policy makers are not policy implementers or users • FISMA, DITSCAP, 8500.1, HIPAA, CA SB 1386, FERPA, etc. • Product • Buffer overflows • Resolved by Oracle Corporate development teams • Patches (usually) provided by email blasts from Meta-link • Configuration • Database settings (*.ora) • OS file settings • Network setup • DoE/CIS Benchmark and Oracle Best Practices serve as guide • Implementation • Technologies (VPD, Auditing, etc.) • Design choices
Why is Security Hard? • No system can be 100% secure • Reality is risk mitigation, not risk avoidance • Difficult to prove good security • Bad security gets proven to/for us • Good security and no security can look the same • How does one know how secure they are? • Many things to secure • People, equipment, OS, network, Application Servers, applications, and databases
Security has to be built in to the system, not bolted on afterwards Security Tenets
Security Tenets • Defense in depth • Security in layers for higher assurance
Security Tenets • Be proactive
Security Tenets • Abide by the least-privilege principle Create Session DBA Create Table Alter Session Create Procedure Drop Table Create View Create Synonym Create Sequence
Security Tenets • Abide by the least-privilege principle Create Session Create Table Alter Session Create Procedure Drop Table Create View Create Synonym Create Sequence
Technology and Common Sense Sometimes the answer is easier than you think!
Database Access Privileges only from application User A, Application Access ODBC, JDBC, SQL*NET
Restricted at the Network Layer Firewalls OS network firewall TNS Listener/Connection Manager Strong Authentication Database Logon Triggers Database Access
Key management Application transparency Performance DBMS_OBFUSCATION_TOOLKIT DBMS_CRYPTO 3rd-party crypto Tables, Views Encryption KING sfING SCOTT SCOjd BLAKE ByAgE SMITH SMITH JAMES gAMES JONES fONES MILLER MIER Technology Challenges
Access Control Tables, Views • Controlled by specific object privileges • Controlled by general system privileges • Access enabled through procedures using “definer rights” • Privileges Assigned directly or via Roles • Standard Roles enabled/disabled by default • Password Protected Roles • Global Roles map to Enterprise Roles assigned by OiD • Secure (SAR) allows DB to control enablement
Encrypted SALARY SALARY Ndm,hj 4500 SCOTT SCOTT 20 20 adslkfj 2500 DKNOX DKNOX 10 10 1300 alsdkfj BLAKE BLAKE 30 30 3200 ydusjk SMITH SMITH 20 20 NULL NULL qwuioo 3850 2900 ipopfj JAMES JAMES 30 30 uiolkl 3100 JONES JONES SCOTT SCOTT 20 20 20 20 qwweraz 3200 3000 3000 40 MATT MATT 40 10 10 KING KING Sensitive Column Data Oracle Label Security (OLS) 10g Column Sensitive VPD
SALARY 4500 SCOTT 20 2500 DKNOX 10 1300 BLAKE 30 3200 SMITH 20 3850 NULL SCOTT 20 2900 DKNOX 10 JAMES 30 3100 BLAKE 30 SCOTT JONES 20 20 3200 3000 SMITH 20 JAMES 30 JONES SCOTT 20 20 40 40 MATT MATT 10 KING 10 KING Sensitive Columns Select name, deptno FROM EMP View
Password Policy Example • Cannot be similar to user’s name • Cannot be easily guessable • Must be at least 12 characters in length • Contains upper and lower case characters • Contains at least one special character • Contains at least one number • Rotated every 14 days • Cannot be re-used for 5 years My current password: “This1is2Hard!”
Balancing the Business Need flexibility to adjust to current situation Best Case: Accommodate all requirements Usability x Security Performance
Make Security a First-Class Citizen • Security placed in at design • Multi-layered implementation • Proactively act to maintain a strong posture • Mitigate the risks – don’t eliminate the risks • Apply common sense before applying cool technology • Consider the competing factors • Make it practical, usable and performant
Q & Q U E S T I O N S A N S W E R S A
Practical Security Part II: Coming Next ... Your Need to Know