SlideShare una empresa de Scribd logo
1 de 37
2
• Authentication
• Authorization
• Auditing
• Encryption
• IBM Guardium Integration
3
• Basic challenge-response
– Hashed password managed in MongoDB
• Kerberos integration using SASL
– Connects to an existing Kerberos infrastucture
– Passwords managed in existing system, not MongoDB
• Can combine these if desired in same server
• Likely adding LDAP integration in 2.6
4
• Roles assigned in MongoDB
– Currently no 3rd
party integration for authorization
• Usernames are in MongoDB and have role(s)
assigned to them
• You can add roles together to build permissioning
you need for a user
5
Individual DB
DB User Access
•read
•readWrite
Database admin access
•dbAdmin
•userAdmin
Individual DB
DB User Access
•read
•readWrite
Database admin access
•dbAdmin
•userAdmin
Admin DB – Cluster-wide
ClusterAdmin
Database admin access
• dbAdminAnyDatabase
• userAdminAnyDatabase
DB User Access
• readAnyDatabase
• readWriteAnyDatabase
Admin DB – Cluster-wide
ClusterAdmin
Database admin access
• dbAdminAnyDatabase
• userAdminAnyDatabase
DB User Access
• readAnyDatabase
• readWriteAnyDatabase
6
Database Administrator (DBA)
Administrator for all parts of the system
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
•userAdminAnyDatabase
•readWriteAnyDatabase
Database Administrator (DBA)
Administrator for all parts of the system
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
•userAdminAnyDatabase
•readWriteAnyDatabase
Developer users
Developers in dev and test environments
MongoDB role (in dev and test):
•readWriteAnyDatabase
Developer users
Developers in dev and test environments
MongoDB role (in dev and test):
•readWriteAnyDatabase
Application users
Username for the application itself
across databases in all environments
MongoDB role:
•readWriteAnyDatabase
Application users
Username for the application itself
across databases in all environments
MongoDB role:
•readWriteAnyDatabase
7
Central Permissioning Group
Only manages users and their
permissions
MongoDB role:
•userAdminAnyDatabase
Central Permissioning Group
Only manages users and their
permissions
MongoDB role:
•userAdminAnyDatabase
Database Administrator
Manages the cluster, databases,
collections, and indexes
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
Database Administrator
Manages the cluster, databases,
collections, and indexes
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
Developer users
Developers in dev and test environments
MongoDB role (in dev and test):
•readWriteAnyDatabase
Developer users
Developers in dev and test environments
MongoDB role (in dev and test):
•readWriteAnyDatabase
Application users
Username for the application itself
across databases in all environments
MongoDB role:
•readWriteAnyDatabase
Application users
Username for the application itself
across databases in all environments
MongoDB role:
•readWriteAnyDatabase
8
For each applicationFor each application
Central Permissioning Group
Only manages users and their permissions
MongoDB role:
•userAdminAnyDatabase
Central Permissioning Group
Only manages users and their permissions
MongoDB role:
•userAdminAnyDatabase
Database Administrator
Manages the architecture, databases,
collections, and indexes for all DBs
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
Database Administrator
Manages the architecture, databases,
collections, and indexes for all DBs
MongoDB roles:
•clusterAdmin
•dbAdminAnyDatabase
Developer Users
Developers in dev and test
environments for this DB
MongoDB role (in dev and test):
•readWrite
Developer Users
Developers in dev and test
environments for this DB
MongoDB role (in dev and test):
•readWrite
Application Users
Username for the
application itself to use
for the one DB
MongoDB role:
•readWrite
Application Users
Username for the
application itself to use
for the one DB
MongoDB role:
•readWrite
Application Admin
Manages one DB only
MongoDB role
•dbAdmin
Application Admin
Manages one DB only
MongoDB role
•dbAdmin
9
• Currently only a small set of operations are
logged
• Logged in the main Mongo server log
• In v2.6
– Separate audit log
– More operations will be logged (DB, collections, index
changes, etc.)
10
• Data in transit
– SSL between all MongoDB components is in the
Enterprise version
– Or build in your own SSL library from the open source
version
• Data at rest
– Left to the customer for their preferred file system
encryption (e.g. IBM offers this)
11
• Driven by a large mutual banking customer who
wanted additional features
– Integrating with their enterprise auditing platform
(Guardium)
– Policy-driven privileged user monitoring for ALL
operations (including reads)
– Plus many more features that Kathy will talk about now
© 2013 IBM Corporation
Information Management
Best Practices for Securing and Protecting
MongoDB Data
(Featuring IBM InfoSphere Guardium)
Kathy Zeidenstein, IBM InfoSphere Guardium Evangelist
Sundari Voruganti, QA Lead and solutions architect
29 May 2013
© 2013 IBM Corporation
13
Information Management
Data Governance and Security are changing rapidly
Data Explosion
Everything is
Everywhere
Attack
Sophistication
Moving from traditional perimeter-
based security…
…to logical “perimeter” approach to
security—focusing on the data and
where it resides
Firewall
Antivirus
IPS
• Cloud, Mobile and Data momentum is breaking down the traditional perimeter and forcing us to look at security differently
• Focus needs to shift from the perimeter to the data that needs to be protected
Consumerization
of IT
© 2013 IBM Corporation
14
Information Management
Address key data security concerns
The gap: minutes to compromise, months to discover and remediate
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038
Time span of events by percent of breaches
14
Patches, encryption
Monitoring
© 2013 IBM Corporation
15
Information Management
Keeping up with ever-changing global and industry regulations
Canada:
Personal Information Protection
& Electronics Document Act
USA:
Federal, Financial & Healthcare
Industry Regulations & State Laws
Mexico:
E-Commerce Law
Colombia:
Political Constitution –
Article 15
Brazil:
Constitution, Habeas Data &
Code of Consumer Protection &
Defense
Chile:
Protection of
Personal Data Act
Argentina:
Habeas Data Act
South Africa:
Promotion of Access
to Information Act
United Kingdom:
Data Protection
Act
EU:
Protection
Directive
Switzerland:
Federal Law on
Data Protection
Germany:
Federal Data Protection
Act & State Laws
Poland:
Polish
Constitution
Israel:
Protection of
Privacy Law
Pakistan:
Banking Companies
Ordinance
Russia:
Computerization & Protection of Information
/ Participation in Int’l Info Exchange
China
Commercial
Banking Law
Korea:
3 Acts for Financial
Data Privacy
Hong Kong:
Privacy Ordinance
Taiwan:
Computer- Processed
Personal Data
Protection LawJapan:
Guidelines for the
Protection of Computer
Processed Personal Data
India:
SEC Board of
India Act
Vietnam:
Banking Law
Philippines:
Secrecy of Bank
Deposit Act
Australia:
Federal Privacy
Amendment Bill
Singapore:
Monetary Authority of
Singapore Act
Indonesia:
Bank Secrecy
Regulation 8
New Zealand:
Privacy Act
© 2013 IBM Corporation
16
Information Management
Helping Organizations Progress in Their Security Maturity
People Data Applications Infrastructure Security
Intelligence
Optimized
Role based
analytics
Identity
governance
Privileged user
controls
Data flow
analytics
Data
governance
Secure app
engineering
processes
Fraud detection
Advanced
network
monitoring
Forensics / data
mining
Securing systems
Advanced threat
detection
Network anomaly
detection
Predictive risk
management
Proficient
User provisioning
Access mgmt
Strong
authentication
Access
monitoring
Data loss
prevention
Application
firewall
Source code
scanning
Virtualization
security
Asset mgmt
Endpoint /
network security
management
Real-time event
correlation
Network forensics
Basic
Centralized
directory
Encryption
Access control
Application
scanning
Perimeter security
Anti-virus
Log management
Compliance
reporting
InfoSphere
Guardium
Data
Encryption
InfoSphere
Guardium
Activity
Monitoring
Static Data
(at rest)
Static Data
(at rest)
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Validated by 10gen
© 2013 IBM Corporation
17
Information Management
Meta-Data
(configuration)
Meta-Data
(configuration)
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Static Data
(at rest)
Static Data
(at rest)
17
ApplicationsDatabases ServersNetwork Security Mainframe
Network
Infrastructure
Availability Performance Security
IT
DBA
Application
Network
IT
DBA
App Admin
Network Admin
Focused on the Infrastructure It’s all about the DATA
IT
DBA
App
Network
Security
Compliance
CISO
ClassificationDiscovery
Privacy Integrity
Compliance
Security
Vulnerability Assessment
Configuration Audit System
Guardium VA
Activity Monitoring
Blocking / Masking
Guardium DAM
Flexible and heterogeneous
data encryption
Guardium Encryption
Defense in depth using InfoSphere Guardium
© 2013 IBM Corporation
18
Information Management
IBM InfoSphere Guardium Data Encryption
• Protect sensitive enterprise
information and avoid data
breaches
• Minimize impact to production
• Enforce separation of duties by
keeping security and data
administration separate
• Meet government and industry
regulations (eg. PCI-DSS)
Ensure compliance with
data encryption
Ensure compliance and protect
enterprise data with encryption
Data Encryption
Static Data
(at rest)
Static Data
(at rest)
Guardium
Data
Encyption
© 2013 IBM Corporation
19
Information Management
InfoSphere Guardium Data Encryption Architecture
*communication is only
required at system boot
Policy is used to restrict access to
sensitive data by user and process
information provided by the OS.
Users
Application
Mongod
File System
SAN, NAS,
DAS Storage
OS
SSL/TLSFS Agent
Static Data
(at rest)
Static Data
(at rest)
© 2013 IBM Corporation
20
Information Management
InfoSphere Guardium Activity Monitoring
and Vulnerability Assessment
Prevent data breaches
Mitigate external and internal threats
11
33 Reduce cost of compliance
- Automate and centralize controls
- Simplify audit review processes
22 Ensure the integrity of sensitive data
Prevent unauthorized changes to
data, data infrastructure, configuration
files and logs
Continuously monitor access to sensitive data in SQL and NoSQL
databases, data warehouses, Hadoop big data environments, and file
shares to:
20
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Meta-Data
(configuration)
Meta-Data
(configuration)
© 2013 IBM Corporation
21
Information Management
InfoSphere Guardium value proposition (cont.)
Increase operational efficiency
Automate & centralize internal controls
Across heterogeneous & distributed environments
Identify and help resolve performance issues & application errors
Highly-scalable platform, proven in most demanding data center
environments worldwide
No degradation of infrastructure or business processes
Non-invasive architecture
No changes required to applications or databases
Do it all in an efficient, scalable, and
cost effective way
44
21
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Meta-Data
(configuration)
Meta-Data
(configuration)
© 2013 IBM Corporation
22
Information Management
What Are The Different Methods for Data Activity
Monitoring?
Process logs
SPAN, Network Tap
(appliance based)
Agent
Guardium
Collector
Database
Server
Application
Server
SPAN
Network TAP
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Agent
© 2013 IBM Corporation
23
Information Management
MongoDB Sharded
Cluster
(Routing servers and
Shards)
Clients
InfoSphere Guardium
Collector
Monitoring Reports, Text
search, data mart
Real-time alerts can be
integrated with SIEM systems
S-TAPsMongos
Shards
High level architecture of the InfoSphere Guardium solution for
MongoDB
Lightweight agent sits on MongoDB routing servers
(mongos) and shards (mongod)
Network traffic is copied and sent to a hardened
appliance where parsing, analysis, and logging
occurs, minimizing overhead on the MongoDB
cluster
Separation of duties is enforced – no direct access
to audit data
© 2013 IBM Corporation
Information Management
Technical details
InfoSphere Guardium
© 2013 IBM Corporation
25
Information Management
Mongos
S-TAP monitors access to shards
Secondary
Mongod
Primary Primary
One Recommended Configuration
DB Users,
Admins
Business
apps
X
Mongo
Client
Mongo
Client
Mongo
Client
Mongo
Client
1. Use firewall to
prevent client
acccess to shards
2. Configure S-TAP on
shards to monitor
traffic that does not
come through
mongos
Secondary
Primary
Secondary
Secondary
Mongod
Secondary
Mongod
Secondary
Privileged
user
Shard 1 Shard 2 Shard 3
Config Server
Config Server
Config Server
Config Server
© 2013 IBM Corporation
26
Information Management
26
Capture and Parsing Overview
Mongo
Client
Guardium
Collector
Analysis
engine
test.CreditCard.insert({
"Name“ : "Sundari",
"profile“ : [
{"CCN" : "11999002"},
{"log" : ["new", "customer"]}
],
});
test.CreditCard.insert(
…
Sessions CommandsObjects
Columns/Fields
Read Only
Hardened Repository
(no direct access)
SQL
(message)
INSERTJoe CreditCard
Name
profile.CCN
profile.log
Parse
commands
then log
Joe
Mongos
S-TAP
test.CreditCard.insert
...
test.CreditCard.insert({
"Name“ : "Sundari",
"profile“ : [
{"CCN" : "11999002"},
{"log" : ["new", "customer"]}
],
});
© 2013 IBM Corporation
27
Information Management
Reports/Query Builder
27
1.1.1.1 23345 10.12.1.12 1433 test.CreditCard.insert ({ "Name“ : Sundari",….
Network Packet
Parsed, analyzed,
logged in
repository
Query builder for reports
Sessions
Commands
Objects
Exceptions
Columns/Fields
Read Only
Hardened Repository
SQL
Returned
Data
SessionsSessions
CommandsCommands
Objects
ExceptionsExceptions
Columns/FieldsColumns/Fields
Read Only
Hardened Repository
SQL
Returned
Data
Drag and
drop
attributes
Fields
Conditions
Audit report
© 2013 IBM Corporation
28
Information Management
Quick search
Hey, did someone drop a collection??
© 2013 IBM Corporation
Information Management
Live Demo
InfoSphere Guardium
© 2013 IBM Corporation
30
Information Management
Some typical monitoring use cases
 Here’s just an example of some of the policy rules you can create
 See developerWorks article for more details (June 2013)
© 2013 IBM Corporation
31
Information Management
Examples – Alert when 5 or more failed logins in 3 minutes
© 2013 IBM Corporation
32
Information Management
Examples – Alert on anomalous behavior (#finds)
Detect quickly when users are downloading more than allowed by policy
db.credit_card.find()
© 2013 IBM Corporation
33
Information Management
Detects server-side JavaScript
> db.customer.find( { $where: function() { return obj.credits == obj.debits; } } ); 
All of the following MongoDB operations permit you to run arbitrary JavaScript expressions directly on the
server:
$where
db.eval()
mapReduce
group
“You must exercise care in these cases to prevent users from submitting malicious
JavaScript.”
(http://docs.mongodb.org/manual/faq/developers/#how-does-mongodb-address-sql-or-query-injection)
© 2013 IBM Corporation
34
Information Management
Real-time Data Activity Monitoring, built to scale
Integration with
LDAP, IAM,
SIEM, TSM,
Remedy, …
DATA
InfoSphere
BigInsight
s
© 2013 IBM Corporation
35
Information Management
InfoSphere Guardium for MongoDB
Helping you maintain a safe and secure environment
Dynamic Data
(in motion)
Dynamic Data
(in motion)
Monitor all activity, log what you need
Real-time alerting to reduce time to
discovery
Detect use of possibly unsafe coding
practices (server-side JavaScript)
 Detect dropped indexes or collections
that can affect apps
Block users when required (Advanced)
Highly-scalable platform, proven in most
demanding data center environments
worldwide
Validated by 10gen!
Static Data
(at rest)
Static Data
(at rest)
Protect data from misuse
Policy-based encryption
Separation of duties
 Scale to protect structured and
unstructured data across
heterogeneous environments
without enterprise changes
© 2013 IBM Corporation
36
Information Management
36
For more information
 Join the InfoSphere Guardium community on
developerWorks. bit.ly/guardwiki
 Or click on Contact Us at
Ibm.com/software/data/guardium/database-activity-
monitor/
 Send an email to Kathy at krzeide@us.ibm.com
Look for detailed article on IBM developerWorks
– Part 1 publishes on June 6th
.
© 2013 IBM Corporation
37
Information Management
Gracias
Merc
i
Grazie
Obrigado
Danke
Japanese
French
Russian
German
Italian
Spanish
Brazilian Portuguese
Arabic
Traditional Chinese
Simplified Chinese
Thai
Tack
Swedish
Danke
Dziękuję
Polish

Más contenido relacionado

La actualidad más candente

Information Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting EnvironmentInformation Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting Environmentwebhostingguy
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Mongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMat Keep
 
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...Jürgen Ambrosi
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...Jürgen Ambrosi
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudAjit Bhingarkar
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Securityamiable_indian
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...InSync2011
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell ApartIBM Security
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 

La actualidad más candente (19)

Information Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting EnvironmentInformation Assurance in an Enterprise Hosting Environment
Information Assurance in an Enterprise Hosting Environment
 
1784 1788
1784 17881784 1788
1784 1788
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Mongo db 2.6_security_architecture
Mongo db 2.6_security_architectureMongo db 2.6_security_architecture
Mongo db 2.6_security_architecture
 
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
 
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Database Systems Security
Database Systems SecurityDatabase Systems Security
Database Systems Security
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
Database & Technology 1 _ Barbara Rabinowicz _ Database Security Methoda and ...
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell Apart
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 

Similar a Webinar: Best Practices for Securing and Protecting MongoDB Data

Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Webinar: Enterprise Trends for Database-as-a-Service
Webinar: Enterprise Trends for Database-as-a-ServiceWebinar: Enterprise Trends for Database-as-a-Service
Webinar: Enterprise Trends for Database-as-a-ServiceMongoDB
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseEDB
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration TestingSurabaya Blackhat
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesMongoDB
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Hadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happyHadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happyDataWorks Summit
 
Hadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happyHadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happyAnurag Shrivastava
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityFredReynolds2
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 

Similar a Webinar: Best Practices for Securing and Protecting MongoDB Data (20)

Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Dstca
DstcaDstca
Dstca
 
Webinar: Enterprise Trends for Database-as-a-Service
Webinar: Enterprise Trends for Database-as-a-ServiceWebinar: Enterprise Trends for Database-as-a-Service
Webinar: Enterprise Trends for Database-as-a-Service
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security Features
 
1784 1788
1784 17881784 1788
1784 1788
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Hadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happyHadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happy
 
Hadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happyHadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happy
 
Locking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database SecurityLocking Down Your Data: Best Practices for Database Security
Locking Down Your Data: Best Practices for Database Security
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 

Más de MongoDB

MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB AtlasMongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB AtlasMongoDB
 
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!MongoDB
 
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...MongoDB
 
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDBMongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDBMongoDB
 
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...MongoDB
 
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series DataMongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series DataMongoDB
 
MongoDB SoCal 2020: MongoDB Atlas Jump Start
 MongoDB SoCal 2020: MongoDB Atlas Jump Start MongoDB SoCal 2020: MongoDB Atlas Jump Start
MongoDB SoCal 2020: MongoDB Atlas Jump StartMongoDB
 
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]MongoDB
 
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2MongoDB
 
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...MongoDB
 
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!MongoDB
 
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your MindsetMongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your MindsetMongoDB
 
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas JumpstartMongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas JumpstartMongoDB
 
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...MongoDB
 
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++MongoDB
 
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...MongoDB
 
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep DiveMongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep DiveMongoDB
 
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & GolangMongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & GolangMongoDB
 
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB
 
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...MongoDB
 

Más de MongoDB (20)

MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB AtlasMongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
 
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
 
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
 
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDBMongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
 
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
 
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series DataMongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
 
MongoDB SoCal 2020: MongoDB Atlas Jump Start
 MongoDB SoCal 2020: MongoDB Atlas Jump Start MongoDB SoCal 2020: MongoDB Atlas Jump Start
MongoDB SoCal 2020: MongoDB Atlas Jump Start
 
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
 
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
 
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
 
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
 
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your MindsetMongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
 
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas JumpstartMongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
 
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
 
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
 
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
 
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep DiveMongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
 
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & GolangMongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
 
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
 
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Webinar: Best Practices for Securing and Protecting MongoDB Data

  • 1.
  • 2. 2 • Authentication • Authorization • Auditing • Encryption • IBM Guardium Integration
  • 3. 3 • Basic challenge-response – Hashed password managed in MongoDB • Kerberos integration using SASL – Connects to an existing Kerberos infrastucture – Passwords managed in existing system, not MongoDB • Can combine these if desired in same server • Likely adding LDAP integration in 2.6
  • 4. 4 • Roles assigned in MongoDB – Currently no 3rd party integration for authorization • Usernames are in MongoDB and have role(s) assigned to them • You can add roles together to build permissioning you need for a user
  • 5. 5 Individual DB DB User Access •read •readWrite Database admin access •dbAdmin •userAdmin Individual DB DB User Access •read •readWrite Database admin access •dbAdmin •userAdmin Admin DB – Cluster-wide ClusterAdmin Database admin access • dbAdminAnyDatabase • userAdminAnyDatabase DB User Access • readAnyDatabase • readWriteAnyDatabase Admin DB – Cluster-wide ClusterAdmin Database admin access • dbAdminAnyDatabase • userAdminAnyDatabase DB User Access • readAnyDatabase • readWriteAnyDatabase
  • 6. 6 Database Administrator (DBA) Administrator for all parts of the system MongoDB roles: •clusterAdmin •dbAdminAnyDatabase •userAdminAnyDatabase •readWriteAnyDatabase Database Administrator (DBA) Administrator for all parts of the system MongoDB roles: •clusterAdmin •dbAdminAnyDatabase •userAdminAnyDatabase •readWriteAnyDatabase Developer users Developers in dev and test environments MongoDB role (in dev and test): •readWriteAnyDatabase Developer users Developers in dev and test environments MongoDB role (in dev and test): •readWriteAnyDatabase Application users Username for the application itself across databases in all environments MongoDB role: •readWriteAnyDatabase Application users Username for the application itself across databases in all environments MongoDB role: •readWriteAnyDatabase
  • 7. 7 Central Permissioning Group Only manages users and their permissions MongoDB role: •userAdminAnyDatabase Central Permissioning Group Only manages users and their permissions MongoDB role: •userAdminAnyDatabase Database Administrator Manages the cluster, databases, collections, and indexes MongoDB roles: •clusterAdmin •dbAdminAnyDatabase Database Administrator Manages the cluster, databases, collections, and indexes MongoDB roles: •clusterAdmin •dbAdminAnyDatabase Developer users Developers in dev and test environments MongoDB role (in dev and test): •readWriteAnyDatabase Developer users Developers in dev and test environments MongoDB role (in dev and test): •readWriteAnyDatabase Application users Username for the application itself across databases in all environments MongoDB role: •readWriteAnyDatabase Application users Username for the application itself across databases in all environments MongoDB role: •readWriteAnyDatabase
  • 8. 8 For each applicationFor each application Central Permissioning Group Only manages users and their permissions MongoDB role: •userAdminAnyDatabase Central Permissioning Group Only manages users and their permissions MongoDB role: •userAdminAnyDatabase Database Administrator Manages the architecture, databases, collections, and indexes for all DBs MongoDB roles: •clusterAdmin •dbAdminAnyDatabase Database Administrator Manages the architecture, databases, collections, and indexes for all DBs MongoDB roles: •clusterAdmin •dbAdminAnyDatabase Developer Users Developers in dev and test environments for this DB MongoDB role (in dev and test): •readWrite Developer Users Developers in dev and test environments for this DB MongoDB role (in dev and test): •readWrite Application Users Username for the application itself to use for the one DB MongoDB role: •readWrite Application Users Username for the application itself to use for the one DB MongoDB role: •readWrite Application Admin Manages one DB only MongoDB role •dbAdmin Application Admin Manages one DB only MongoDB role •dbAdmin
  • 9. 9 • Currently only a small set of operations are logged • Logged in the main Mongo server log • In v2.6 – Separate audit log – More operations will be logged (DB, collections, index changes, etc.)
  • 10. 10 • Data in transit – SSL between all MongoDB components is in the Enterprise version – Or build in your own SSL library from the open source version • Data at rest – Left to the customer for their preferred file system encryption (e.g. IBM offers this)
  • 11. 11 • Driven by a large mutual banking customer who wanted additional features – Integrating with their enterprise auditing platform (Guardium) – Policy-driven privileged user monitoring for ALL operations (including reads) – Plus many more features that Kathy will talk about now
  • 12. © 2013 IBM Corporation Information Management Best Practices for Securing and Protecting MongoDB Data (Featuring IBM InfoSphere Guardium) Kathy Zeidenstein, IBM InfoSphere Guardium Evangelist Sundari Voruganti, QA Lead and solutions architect 29 May 2013
  • 13. © 2013 IBM Corporation 13 Information Management Data Governance and Security are changing rapidly Data Explosion Everything is Everywhere Attack Sophistication Moving from traditional perimeter- based security… …to logical “perimeter” approach to security—focusing on the data and where it resides Firewall Antivirus IPS • Cloud, Mobile and Data momentum is breaking down the traditional perimeter and forcing us to look at security differently • Focus needs to shift from the perimeter to the data that needs to be protected Consumerization of IT
  • 14. © 2013 IBM Corporation 14 Information Management Address key data security concerns The gap: minutes to compromise, months to discover and remediate http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z038 Time span of events by percent of breaches 14 Patches, encryption Monitoring
  • 15. © 2013 IBM Corporation 15 Information Management Keeping up with ever-changing global and industry regulations Canada: Personal Information Protection & Electronics Document Act USA: Federal, Financial & Healthcare Industry Regulations & State Laws Mexico: E-Commerce Law Colombia: Political Constitution – Article 15 Brazil: Constitution, Habeas Data & Code of Consumer Protection & Defense Chile: Protection of Personal Data Act Argentina: Habeas Data Act South Africa: Promotion of Access to Information Act United Kingdom: Data Protection Act EU: Protection Directive Switzerland: Federal Law on Data Protection Germany: Federal Data Protection Act & State Laws Poland: Polish Constitution Israel: Protection of Privacy Law Pakistan: Banking Companies Ordinance Russia: Computerization & Protection of Information / Participation in Int’l Info Exchange China Commercial Banking Law Korea: 3 Acts for Financial Data Privacy Hong Kong: Privacy Ordinance Taiwan: Computer- Processed Personal Data Protection LawJapan: Guidelines for the Protection of Computer Processed Personal Data India: SEC Board of India Act Vietnam: Banking Law Philippines: Secrecy of Bank Deposit Act Australia: Federal Privacy Amendment Bill Singapore: Monetary Authority of Singapore Act Indonesia: Bank Secrecy Regulation 8 New Zealand: Privacy Act
  • 16. © 2013 IBM Corporation 16 Information Management Helping Organizations Progress in Their Security Maturity People Data Applications Infrastructure Security Intelligence Optimized Role based analytics Identity governance Privileged user controls Data flow analytics Data governance Secure app engineering processes Fraud detection Advanced network monitoring Forensics / data mining Securing systems Advanced threat detection Network anomaly detection Predictive risk management Proficient User provisioning Access mgmt Strong authentication Access monitoring Data loss prevention Application firewall Source code scanning Virtualization security Asset mgmt Endpoint / network security management Real-time event correlation Network forensics Basic Centralized directory Encryption Access control Application scanning Perimeter security Anti-virus Log management Compliance reporting InfoSphere Guardium Data Encryption InfoSphere Guardium Activity Monitoring Static Data (at rest) Static Data (at rest) Dynamic Data (in motion) Dynamic Data (in motion) Validated by 10gen
  • 17. © 2013 IBM Corporation 17 Information Management Meta-Data (configuration) Meta-Data (configuration) Dynamic Data (in motion) Dynamic Data (in motion) Static Data (at rest) Static Data (at rest) 17 ApplicationsDatabases ServersNetwork Security Mainframe Network Infrastructure Availability Performance Security IT DBA Application Network IT DBA App Admin Network Admin Focused on the Infrastructure It’s all about the DATA IT DBA App Network Security Compliance CISO ClassificationDiscovery Privacy Integrity Compliance Security Vulnerability Assessment Configuration Audit System Guardium VA Activity Monitoring Blocking / Masking Guardium DAM Flexible and heterogeneous data encryption Guardium Encryption Defense in depth using InfoSphere Guardium
  • 18. © 2013 IBM Corporation 18 Information Management IBM InfoSphere Guardium Data Encryption • Protect sensitive enterprise information and avoid data breaches • Minimize impact to production • Enforce separation of duties by keeping security and data administration separate • Meet government and industry regulations (eg. PCI-DSS) Ensure compliance with data encryption Ensure compliance and protect enterprise data with encryption Data Encryption Static Data (at rest) Static Data (at rest) Guardium Data Encyption
  • 19. © 2013 IBM Corporation 19 Information Management InfoSphere Guardium Data Encryption Architecture *communication is only required at system boot Policy is used to restrict access to sensitive data by user and process information provided by the OS. Users Application Mongod File System SAN, NAS, DAS Storage OS SSL/TLSFS Agent Static Data (at rest) Static Data (at rest)
  • 20. © 2013 IBM Corporation 20 Information Management InfoSphere Guardium Activity Monitoring and Vulnerability Assessment Prevent data breaches Mitigate external and internal threats 11 33 Reduce cost of compliance - Automate and centralize controls - Simplify audit review processes 22 Ensure the integrity of sensitive data Prevent unauthorized changes to data, data infrastructure, configuration files and logs Continuously monitor access to sensitive data in SQL and NoSQL databases, data warehouses, Hadoop big data environments, and file shares to: 20 Dynamic Data (in motion) Dynamic Data (in motion) Meta-Data (configuration) Meta-Data (configuration)
  • 21. © 2013 IBM Corporation 21 Information Management InfoSphere Guardium value proposition (cont.) Increase operational efficiency Automate & centralize internal controls Across heterogeneous & distributed environments Identify and help resolve performance issues & application errors Highly-scalable platform, proven in most demanding data center environments worldwide No degradation of infrastructure or business processes Non-invasive architecture No changes required to applications or databases Do it all in an efficient, scalable, and cost effective way 44 21 Dynamic Data (in motion) Dynamic Data (in motion) Meta-Data (configuration) Meta-Data (configuration)
  • 22. © 2013 IBM Corporation 22 Information Management What Are The Different Methods for Data Activity Monitoring? Process logs SPAN, Network Tap (appliance based) Agent Guardium Collector Database Server Application Server SPAN Network TAP Dynamic Data (in motion) Dynamic Data (in motion) Agent
  • 23. © 2013 IBM Corporation 23 Information Management MongoDB Sharded Cluster (Routing servers and Shards) Clients InfoSphere Guardium Collector Monitoring Reports, Text search, data mart Real-time alerts can be integrated with SIEM systems S-TAPsMongos Shards High level architecture of the InfoSphere Guardium solution for MongoDB Lightweight agent sits on MongoDB routing servers (mongos) and shards (mongod) Network traffic is copied and sent to a hardened appliance where parsing, analysis, and logging occurs, minimizing overhead on the MongoDB cluster Separation of duties is enforced – no direct access to audit data
  • 24. © 2013 IBM Corporation Information Management Technical details InfoSphere Guardium
  • 25. © 2013 IBM Corporation 25 Information Management Mongos S-TAP monitors access to shards Secondary Mongod Primary Primary One Recommended Configuration DB Users, Admins Business apps X Mongo Client Mongo Client Mongo Client Mongo Client 1. Use firewall to prevent client acccess to shards 2. Configure S-TAP on shards to monitor traffic that does not come through mongos Secondary Primary Secondary Secondary Mongod Secondary Mongod Secondary Privileged user Shard 1 Shard 2 Shard 3 Config Server Config Server Config Server Config Server
  • 26. © 2013 IBM Corporation 26 Information Management 26 Capture and Parsing Overview Mongo Client Guardium Collector Analysis engine test.CreditCard.insert({ "Name“ : "Sundari", "profile“ : [ {"CCN" : "11999002"}, {"log" : ["new", "customer"]} ], }); test.CreditCard.insert( … Sessions CommandsObjects Columns/Fields Read Only Hardened Repository (no direct access) SQL (message) INSERTJoe CreditCard Name profile.CCN profile.log Parse commands then log Joe Mongos S-TAP test.CreditCard.insert ... test.CreditCard.insert({ "Name“ : "Sundari", "profile“ : [ {"CCN" : "11999002"}, {"log" : ["new", "customer"]} ], });
  • 27. © 2013 IBM Corporation 27 Information Management Reports/Query Builder 27 1.1.1.1 23345 10.12.1.12 1433 test.CreditCard.insert ({ "Name“ : Sundari",…. Network Packet Parsed, analyzed, logged in repository Query builder for reports Sessions Commands Objects Exceptions Columns/Fields Read Only Hardened Repository SQL Returned Data SessionsSessions CommandsCommands Objects ExceptionsExceptions Columns/FieldsColumns/Fields Read Only Hardened Repository SQL Returned Data Drag and drop attributes Fields Conditions Audit report
  • 28. © 2013 IBM Corporation 28 Information Management Quick search Hey, did someone drop a collection??
  • 29. © 2013 IBM Corporation Information Management Live Demo InfoSphere Guardium
  • 30. © 2013 IBM Corporation 30 Information Management Some typical monitoring use cases  Here’s just an example of some of the policy rules you can create  See developerWorks article for more details (June 2013)
  • 31. © 2013 IBM Corporation 31 Information Management Examples – Alert when 5 or more failed logins in 3 minutes
  • 32. © 2013 IBM Corporation 32 Information Management Examples – Alert on anomalous behavior (#finds) Detect quickly when users are downloading more than allowed by policy db.credit_card.find()
  • 33. © 2013 IBM Corporation 33 Information Management Detects server-side JavaScript > db.customer.find( { $where: function() { return obj.credits == obj.debits; } } );  All of the following MongoDB operations permit you to run arbitrary JavaScript expressions directly on the server: $where db.eval() mapReduce group “You must exercise care in these cases to prevent users from submitting malicious JavaScript.” (http://docs.mongodb.org/manual/faq/developers/#how-does-mongodb-address-sql-or-query-injection)
  • 34. © 2013 IBM Corporation 34 Information Management Real-time Data Activity Monitoring, built to scale Integration with LDAP, IAM, SIEM, TSM, Remedy, … DATA InfoSphere BigInsight s
  • 35. © 2013 IBM Corporation 35 Information Management InfoSphere Guardium for MongoDB Helping you maintain a safe and secure environment Dynamic Data (in motion) Dynamic Data (in motion) Monitor all activity, log what you need Real-time alerting to reduce time to discovery Detect use of possibly unsafe coding practices (server-side JavaScript)  Detect dropped indexes or collections that can affect apps Block users when required (Advanced) Highly-scalable platform, proven in most demanding data center environments worldwide Validated by 10gen! Static Data (at rest) Static Data (at rest) Protect data from misuse Policy-based encryption Separation of duties  Scale to protect structured and unstructured data across heterogeneous environments without enterprise changes
  • 36. © 2013 IBM Corporation 36 Information Management 36 For more information  Join the InfoSphere Guardium community on developerWorks. bit.ly/guardwiki  Or click on Contact Us at Ibm.com/software/data/guardium/database-activity- monitor/  Send an email to Kathy at krzeide@us.ibm.com Look for detailed article on IBM developerWorks – Part 1 publishes on June 6th .
  • 37. © 2013 IBM Corporation 37 Information Management Gracias Merc i Grazie Obrigado Danke Japanese French Russian German Italian Spanish Brazilian Portuguese Arabic Traditional Chinese Simplified Chinese Thai Tack Swedish Danke Dziękuję Polish