Más contenido relacionado La actualidad más candente (20) Similar a Top 10 Database Threats (20) Top 10 Database Threats1. Top 10 Database Threats 2013
Raphael Reich
Senior Director, Product Marketing
© 2013 Imperva, Inc. All rights reserved.
3. Raphael Reich
Sr. Director, Product Marketing | Imperva
Expertise
+ 20+ years in product marketing, product
management, and software engineering
Professional Experience
+ Cisco, Check Point, Network General
Academics
+ Bachelor’s degree in Computer Science
from UC Santa Cruz
+ MBA from UCLA
© 2013 Imperva, Inc. All rights reserved.
5. Background
Ninety six percent (96%) of records breached are
from databases.
2012 Verizon Data Breach Report
5%
95%
Less than 5% of Security spend is on data center
security.
Worldwide Security Products 2011-2014 Forecast (IDC -February 2011)
5 © 2013 Imperva, Inc. All rights reserved.
8. (1) Excessive and Unused Privileges
Used to work in Accounts Payable
Jim works in Sales
Uses his access for personal enrichment
8 © 2013 Imperva, Inc. All rights reserved.
12. (3) SQL Injection
The Best Way To Spend Your Security Budget
“…one SQL injection attack
can bring in big bucks. It's a
Admin
no-brainer that you should
' OR 1 = 1 -- make this problem top
priority.”
Dark Reading, Feb 28, 2013
12 © 2013 Imperva, Inc. All rights reserved.
14. (4) Malware
69% of breaches incorporated malware
Source: Verizon Data Breach Report, 2012
14 © 2013 Imperva, Inc. All rights reserved.
18. (6) Storage Media Exposure
How South Carolina Failed
To Spot Hack Attack
“…the attacker had successfully
located and begun copying 23
database backup files…”
Information Week, November 26, 2012
18 © 2013 Imperva, Inc. All rights reserved.
24. (9) Denial of Service
24 © 2013 Imperva, Inc. All rights reserved.
25. (9) Denial of Service
25 © 2013 Imperva, Inc. All rights reserved.
29. Layered Approach to Database Security
Discovery and Assessment
User Rights Management
Monitoring and Blocking
Auditing
Data Protection
Non-Technical Security
29 © 2013 Imperva, Inc. All rights reserved.
33. Auditing
33 © 2013 Imperva, Inc. All rights reserved.
36. Customer Use Case: Sensitive Data Auditing
36 © 2013 Imperva, Inc. All rights reserved.
37. Sensitive Data Auditing Use Case
Database
User
SecureSphere DAM:
Capture audit details and generate
A multinational oil & gas reports
company needed to: Generate SIEM alerts
Streamline database auditing for PCI
and SOX
Reduce time and log collection errors
Send activity alerts to Security
Information Event Manager (SIEM)
Audit Reports
Audit Logs !
SIEM
37 © 2013 Imperva, Inc. All rights reserved.
38. Auditing Sensitive Data – Key Capabilities
Activity Auditing
SecureSphere
DAM
Collect and record
database activity
details
Satisfy compliance
requirements
Conduct forensic Users Audit Policies Databases Audit Details
analysis
Privileged User
Monitoring
Monitor privileged or
“power” users
Enforce Separation of
Duties
See all activity incl. local Audit Policies
Privileged User
access
Database Agent Appliance
Block if needed
38 © 2013 Imperva, Inc. All rights reserved.
39. Auditing Sensitive Data – Key Capabilities
Reporting
Enterprise class PCI, HIPAA, SOX…
reporting framework
Custom
Analyze threats
Accelerate compliance
Dashboard
Alerting
Alert in real time on
suspicious behavior SYSLOG
Quickly identify attacks
Prevent data theft
Email
SIEM
39 © 2013 Imperva, Inc. All rights reserved.
40. Auditing Sensitive Data – Key Capabilities
Discovery &
Classification
Discover DBs and
classify sensitive
information Credit Cards
Discover active DB
services
Identify rogue DBs Rogue
Determine what needs
SSN
to be monitored
PII
SecureSphere DAS
40 © 2013 Imperva, Inc. All rights reserved.
41. Webinar Materials
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
Answers to
Post-Webinar
Attendee
Discussions
Questions
Webinar
Join Group
Recording Link
© 2013 Imperva, Inc. All rights reserved.