SlideShare a Scribd company logo
1 of 86
The Impact of Regulatory Compliance
on Database Administration

Craig S. Mullins
Corporate Technologist
NEON Enterprise Software, Inc.
Authors

    This presentation was prepared by:

    Craig S. Mullins
    Corporate Technologist



    NEON Enterprise Software, Inc.
    14100 Southwest Freeway, Suite 400
    Sugar Land, TX 77478
    Tel: 281.491.6366
    Fax: 281.207.4973
    E-mail: craig.mullins@neonesoft.com

    This document is protected under the copyright laws of the United States and other countries as an unpublished work. This
    document contains information that is proprietary and confidential to NEON Enterprise Software, which shall not be disclosed
    outside or duplicated, used, or disclosed in whole or in part for any purpose other than to evaluate NEON Enterprise Software
    products. Any use or disclosure in whole or in part of this information without the express written permission of NEON Enterprise
    Software is prohibited. © 2006 NEON Enterprise Software (Unpublished). All rights reserved.




2
Agenda

    An Overview of Government Regulations and Issues

    Impacts on Data and Database Management
          Data Quality
          Long-term Data Retention
          Database Security
          Database and Data Access Auditing
          Data Masking
          Controls on DBA Procedures
            —   Backup & Recovery
            —   Change Management
          Metadata Management


3
Compliance Continues to Exert Pressure


    Increasing compliance pressure. Compliance
    requirements, such as Sarbanes-Oxley, HIPAA, CA
    SB 1386, and the Gramm-Leach-Bliley Act
    (GLBA), are driving interest for all enterprises to
    take strong security measures to protect
    private data. These include initiatives around
    data-at-rest encryption, granular auditing,
    intrusion detection and prevention, and end-to-
    end security measures.
            Source: Trends 2006: Database Management Systems, Forrester Research


4
Regulatory Compliance

    GLB

    HIPAA

    PCI-DSS

    Basel II

    Sarbanes-Oxley

    CA SB1386

    Federal Information Security Management Act

    “Red Flag” Rules (FRCA)


5
Legislation & Compliance
    The Gramm-Leach-Bliley Act (GLB), is a federal law enacted in the
    United States to control the ways that financial institutions deal with the
    private information of individuals. The Act regulates the collection and
    disclosure of private financial information; stipulates safeguards requiring
    security programs; and prohibits the practice of pretexting.


    HIPAA (Health Insurance Portability and Accountability Act) creates
    national standards to protect individuals' medical records & personal
    health information. The Privacy Rule provides that, in general, a covered
    entity may not use or disclose an individual’s healthcare information
    without permission except for treatment, payment, or healthcare
    operations.


    PCI DSS (Payment Card Industry Data Security Standard) includes
    requirements for security management, policies, procedures, network
    architecture, software design and other critical protective measures. This
    comprehensive standard is intended to help organizations proactively
    protect customer account data.


6
Legislation & Compliance
          Basel II is an international banking regulation the goal of which is to
          produce uniformity in the way banks and banking regulators approach
          risk management across national borders.

          The Sarbanes-Oxley Act (SOX) establishes standards for all U.S. public
          company boards, management, and public accounting firms. The
Section   Public Company Accounting Oversight Board (PCAOB) was created by
 404      SOX to oversee auditors of public companies. The primary goals of SOX
          were to strengthen and restore public confidence in corporate
          accountability and to improve executive responsibility.



          The California Security Breach Notification Law (CA SB 1386)
          requires companies to notify California customers if PII maintained in
          computerized data files have been compromised by unauthorized
          access.




  7
FISMA: Federal Information Security Mgmt Act

    Title III of the E-Government Act, FISMA basically states that
    federal agencies, contractors, and any entity that supports
    them, must maintain security commensurate with potential
    risk.

    The Fair and Accurate Credit Transactions Act of 2003
    (FACTA), requires all federally regulated financial institutions
    to be in full compliance by Nov. 1, 2008. This is also known as
    the "Red Flag" rules.
          Requires that financial institutions and creditors develop and
           deploy an Identity Theft Prevention Program for combating ID
           theft on new and existing accounts.




8
Other Regulations & Issues?
    And, there are more regulations to consider, for example:
         the USA Patriot Act
         Can SPAM Act of 2003
         Telecommunications Act of 1996
         The Data Quality Act

    And, there are more regulations to contend with; based
    upon your industry, location, etc.

    As well as, new regulations that will continue to be written
    by government and imposed over time…

    Regulations have brought to light some of the personal
    financial information that has been compromised (stolen)
         More on this later…

9
Regulatory Compliance is International

     Country       Examples of Regulations
     Australia     Commonwealth Government’s Information Exchange Steering Committee, Evidence
                   Act 1995, more than 80 acts governing retention requirements

     Brazil        Electronic Government Programme, EU GMP Directive 1/356/EEC-9

     Canada        Bill 198, Competition Act,

     France        Model Requirements for the Management of Electronic Records, EU Directive
                   95/46/EC

     Germany       Federal Data Protection Act, Model Requirements for the Management of Electronic
                   Records, EU Directive 95/46/EC

     Japan         Personal Data Protection Bill, J-SOX

     Switzerland   Swiss Code of Obligations articles 957 and 962

     United        Data Protection Act, Civil Evidence Act 1995, Police and Criminal Evidence Act
     Kingdom       1984, Employment Practices Data Protection Code, Combined Code on Corporate
                   Governance 2003

10
Regulations Tracked by Gartner




11
Regulations Impacting Security
        Governance vs. Privacy

             Governance                     Privacy

       •                               •   EU DPD
            Basel II
       •                               •   AU/NZ NPP
            Sarbanes Oxley
       •                               •   SB 1386/AB 1950
            OFAC
       •                               •   GLBA
            Turnbull Report
                                       •   HIPAA
                                       •   PCI
                                       •   FCRA -- “Red Flag”


     Protect and control the process        Protect the data


12
http://www.unifiedcompliance.com/it_impact_zones/




13
Regulatory Compliance and…

     Impact: upper-level management is keenly aware of the need to
     comply, if not all of the details that involves.

     Prosecution: being successfully prosecuted         (see next slide)   can result
     in huge fines and even imprisonment.

     Cost: cost of complete compliance can be significant, but so can the
     cost of non-compliance. No longer easier just to ignore problems.

     Durability: although there have been discussions about scaling back
     some laws (e.g. SOX), increasing regulations and therefore
     increasing time, effort, and capital will be spent on compliance.
           That is, the issue will not just disappear if you ignore it long enough!

     But, at the end of the day, ensuring exact compliance can be a gray
     area.
14
The Reality of Prosecution
       Enron – In May 25, 2006 Ken Lay (former CEO) was found guilty of 10 counts against him.
       Because each count carried a maximum 5- to 10-year sentence, Lay could have faced 20 to
       30 years in prison. However, he died while vacationing in about three and a half months
       before his scheduled sentencing. Jeff Skilling (another former CEO) was found guilty of 19
       out of 28 counts against him, including one count of conspiracy, one count of insider
       trading. Skilling was sentenced to 24 years and 4 months in federal prison.

       WorldCom – In June 2005, 800,000 investors were awarded $6 billion in settlements; the
       payouts will be funded by the defendants in the case, including investment banks, audit
ROI?   firms, and the former directors of WolrdCom. The judge in the case noted that the
       settlements were “of historic proportions.” Additionally, Bernard Ebbers, former CEO of
       WorldCom, was convicted of fraud and sentenced to 25 years in prison.

       Tyco – In September 2005, Dennis Kozlowski (former Tyco CEO) and Mark Swartz (former
       Tyco CFO) were sentenced to 8 to 25 years in prison for stealing hundreds of millions of
       dollars from Tyco. Additionally, Kozlowski had to pay $70 million in restitution; Swartz $35
       million.

       Adelphia – In June 2005, John Rigas (founder and former CEO) was sentenced to 15 years
       in prison; his son, Tony, was also convicted of bank fraud, securities fraud, & conspiracy -
       he received a 20 year sentence.

       HealthSouth – In March 2005, Richard Scrushy, founder and former CEO, was acquitted of
       charges relating to 1 $2.7 billion earnings over-statement. Scrushy blamed his subordinates
       for the fraud…
  15
But Business Benefits Do Exist




 Source: Unisphere Research, OAUG Automating Compliance 2006 Survey

16
Why Should DBAs Care About Compliance?


     Compliance starts with the CEO…
          But the CEO relies on the CIO to ensure that IT
           processes are compliant
          And the CIO relies on the IT managers
          One of whom (DBA Manager) controls the database
           systems
            —   Who relies on DBAs to ensure that data is protected and
                controlled.




17
So What Do Data Mgmt Folks Need to Do?

     Implement standard controls and methods for
     improving:
          Data Quality
          Long-term Data Retention
          Database Security
          Database and Data Access Auditing
          Data Masking
          Backup & Recovery

18
          DBA Procedures
Issue #1: Data Quality

     A recent SAS/Risk Waters
     Group survey indicated
     that 93% of respondents
     had experienced losses of
     $10 million in one year…
          And 21% of respondents said
           that at some point, their
           company suffered a loss
           between $10,000 and
           $1,000,000 in a single day.

     The prime reasons given
     for such losses were
     incomplete, inaccurate or
     obsolete data, and
     inadequate processes.               Source: Gartner (April 2006)


19
Examples of Data Quality Regulations

     The Data Quality Act
           Careful, it sounds better than it actually is.
           Written by an industry lobbyist and slipped into a giant
            appropriations bill in 2000 without congressional discussion
            or debate
           Basically consists of two sentences directing the OMB to
            ensure that all information disseminated by the federal
            government is reliable.
     Sarbanes-Oxley
           Financial reports must be ACCURATE
           Without good data quality this is impossible.


20
Data Quality: Is it Really a Major Concern?

     How good is your data quality?
     Estimates show that, on average, data quality is suspect:
           Payroll record changes have a 1% error rate;
           Billing records have a 2-7% error rate, and;
           The error rate for credit records: as high as 30%.
                                    Source: T.C. Redman, Data Quality: Management and Technology,
                                            (New York, Bantam Books).



     Similar studies in Computer World and the Wall Street Journal
     back up the notion of overall poor data quality.
           W.M. Bulkeley, "Databases Are Plagued by Reign of Error," The Wall Street Journal, 26
            May 1992, B2.

           B. Knight, "The Data Pollution Problem," ComputerWorld, 28 September 1992, 81-84.


21
The High Cost of Poor Quality Data


            “Poor data quality costs the typical company at
            least ten percent (10%) of revenue; twenty
            percent (20%) is probably a better estimate.”
                         Source: Thomas C. Redman, “Data: An Unfolding Quality Disaster”,
                                 DMReview Magazine, August 2004




Valid &
Accurate?



   22
Database Constraints


     By building constraints into the database, overall
     data quality may be improved:
          Referential Integrity
            —   Primary Key
            —   Foreign Key(s)
          UNIQUE constraints
          CHECK constraints
          Triggers
          Domains

23
Data Profiling


     With data profiling, you can:
          Discover the quality, characteristics and potential
           problems of information before beginning data-driven
           projects
          Drastically reduce the time and resources required to
           find problematic data
          Allow business analysts and data stewards to have
           more control on the maintenance and management
           of enterprise data
          Catalog and analyze metadata and discover metadata
           relationships

24
Issue #2: Long-Term Data Retention

     The average installed storage
     capacity at Fortune 1000
     corporations has grown from
     198TB to 680TB in less than
     two years.

     This is a growth rate of more
     than 340% as capacity
     continues to double every 10
     months.



           Source: TIP (TheInfoPro). 2006 www.theinfopro.net


25
More Data, Stored for Longer Durations

                                                                    Data Retention Issues:
                                                                    Volume of data    (125% CAGR)

                                                                    Length of retention
                                                                n   requirement
                                                           io
                                                         ct
     Amount of Data




                                                     e
                                                 r ot               Varied types of data
                                             P
                                         e
                                    a nc                            Security issues
                                i
                             pl
                      C om



             0           Time Required                              30+ Yrs


26
Data Retention Drives Data(base) Archiving

     Data Retention Requirements refer to the length
     of time you need to keep data
         Determined by laws – regulatory compliance
         


                More than 150 state and federal laws
                Dramatically increasing retention periods for
                 corporate data
         Determined by business needs
         


                Reduce operational costs
                     Large volumes of data interfere with operations:
                      performance, backup/recovery, etc.
                Isolate content from changes
27
                     Protect archived data from
Regulatory Compliance & Data
     Retention Requirements




28
Can You Read This?




29
E-Discovery

     Electronic evidence is the predominant form of discovery
     today. (Gartner,Research Note G00136366)
     Electronic evidence could encompass anything that is
     stored anywhere. (Gartner,Research Note G00133224)
     When data is being collected (for e-discovery) it is
     imperative that it is not changed in any way. Metadata
     must be preserved… (Gartner,Research Note G00133224)
     Gartner Strategic Planning Assumption: Through 2007,
     more than half of IT organizations and in-house legal
     departments will lack the people and the appropriate skills
     to handle electronic discovery requirements (0.8
     probability). (Gartner,Research Note G00131014)


30
E-Discovery and the FRCP

     Federal Rules of Civil Procedure, Rule 34b
          Took effect December 2006
          A party who produces documents for inspection
           shall produce them . . . as they are kept in the
           usual course of business..."
          The amended rules state that requested information
           must be turned over within 120 days after a
           complaint has been served.

     So data stored in database systems must be able
     to be produced in electronic form.

31
What “Solutions” Are Out There?

         Keep Data in Operational Database
           —   Problems with authenticity of large amounts of
               data over long retention times
           —   Operational performance degradation

         Store Data in UNLOAD files (or backups)
           —   Problems with schema change and reading archived data
           —   Using backups poses even more serious problems

         Move Data to a Parallel Reference Database
           —   Combines problems of the previous two

         Move Data to a Database Archive



32
Components of a Database Archiving Solution

        Database Archiving: The process of removing
        selected data records from operational databases
Purge   that are not expected to be referenced again and
                                                                 Databases

        storing them in an archive data store where they
        can be retrieved if needed.                           Data        Data
                                                             Extract      Recall



                          Metadata
                                                           Archive data store and retrieve
                       capture, design,
                        maintenance


                        Archive data
                                                                                   Archive
                         query and
                           access
                                                       metadata                     data
                                                       policies                    metadata
                                                        history
                         Archive
                       administration



   33
Issue #3: Data and Database Security

     75% of enterprises do not have a DBMS
     security plan.
                  Source: Forrester Research,
                          “Your DBMS Strategy 2005”

     A single intrusion that compromises
     private data can cause immense damage
     to the reputation of an enterprise — and
     in some cases financial damage as well.
                  Source: Forrester Research,
                          “Comprehensive Database Security…”

     Database configurations are not secure
     by default, and they often require
     specialized knowledge and extra effort to
     ensure that configuration options are set
     in the most secure manner possible.
                  Source: Forrester Research,
                          “Comprehensive Database Security…”



34
Obstacles to Database Security




                 Source: Forrester Research,
                         “Comprehensive Database Security…”



35
Database Security By the Numbers

          s   67% of 1,100 security pros said securing databases was
              an important or very important challenge for 2008

                          —   #1 in a list of 13 data protection initiatives

          s   45% of security pros will spend more time on data
              protection in 2008 vs. 2007.
                          —   #3 on a list of 19 security activities

          s   41% will spend more time on database security
              specifically


     Source: TechTarget
36
What is a Data Breach?




37
Data Breaches: A Threat to Your Data

       Privacy Rights Clearinghouse
                 http://www.privacyrights.org/ar/ChronDataBreaches.htm


       Since 2005:
                 In excess of 230 million total records containing sensitive
                  personal information were exposed due to data security
                  breaches…
                    —    ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached
                    —    Since then, there have been 230,454,030 total records breached that
                         contained sensitive personal information*

                                                                            * As of June 30, 2008




38
     * As of Feb 27, 2007, reported by http://www.privacyrights.org/ar/ChronDataBreaches.htm
How Prevalent is this Problem?

                     68% of companies are losing sensitive data or having it stolen
                     out from under them six times a year

                     An additional 20%
                     are losing sensitive
                     data 22 times or
                     more per year.



                    Sources: eWeek, March 3, 2007
                             IT Policy Compliance Group


http://www.eweek.com/c/a/Desktops-and-Notebooks/Report-Some-Companies-Lose-Data-Six-Times-a-Year/

        39
The Cost of a Data Breach

     According to Forrester Research, the
     average cost per record is between
     $90 and $305

     According to the Ponemon Institute,
     the average cost per lost customer
     record is $182
          Average cost per incident: $5 million

     Or use the Data Loss Calculator, free on the web
     at http://www.tech-404.com/calculator.html


40
Most Prevalent Causes of Data Loss




41
Database Security Issues in a Nutshell

        Authentication
             Who is it?

        Authorization
             Who can do it?

        Encryption
             Who can see it?

        Audit
             Who did it?


42
Security From a DB2 Perspective




43
44
Database Security

     Who has access to high-level “roles”:
             Install SYSADM, SYSADM, SYSCTRL, DBADM, etc.

     Auditors will have issues with this, but it is
     difficult, if not impossible, to remove.

     Do any applications require DBA-level authority?
     Why?

     Security monitoring
          Data Access Auditing (more on this in a moment)
          Additional tools

45
SYSADM and Install SYSADM

     Install SYSADM bypasses the DB2 Catalog when checking for
     privileges.
           So, there are no limits on what a user with Install
            SYSADM authority can do.
           And it can only be removed by changing DSNZPARMs
           Basically, needed for catalog and system “stuff”

     SYSADM is almost as powerful, but:
           It can be revoked
           Biggest problem for auditors: SYSADM has access to
            all data in all tables.

46
Suggestions


     • Limit the number of SYSADMs
           And audit everything those users do.

     • Consider associating Install SYSADM with a
           group (RACF)
           Authids that absolutely need Install SYSADM can be
            connected to the group using secondary authids.

     • Similar issues with SYSOPR and Install SYSOPR

47
Data Encryption Considerations

     California's SB 1386 protects personally identifiable
     information; obviously it doesn't matter if encrypted data
     becomes public since it's near impossible to decrypt.
                                          Source: “Encryption May Help Regulatory Compliance”
                                                  Edmund X. DeJesus, SearchSecurity.com
     Types of encryption
           At Rest
           In Transit

     Issues
           Performance
              —   Encrypting and decrypting data consumes CPU
           Applications may need to be changed
              —   See next slide for DB2 V8 encryption functions

48
DB2 V8: Encryption / Decryption
           Encryption: to encrypt the data for a column
                    ENCRYPT_TDES(string, password, hint)
                 ENCRYPT_TDES [can use ENCRYPT() as a synonym for compatibility]

Exit             Triple DES cipher block chaining (CPC) encryption algorithm
Routine?            —   Not the same algorithm used by DB2 on other platforms
                 128-bit secret key derived from password using MD5 hash
                    INSERT INTO EMP (SSN)
                    VALUES(ENCRYPT('289-46-8832','TARZAN','? AND JANE'));

           Decryption: to decrypt the encrypted data for a column
                    DECRYPT_BIT(), DECRYPT_CHAR(), DECRYPT_DB()

                 Can only decrypt expressions encrypted using ENCRYPT_TDES
                    —   Can have a different password for each row if needed
                 Without the password, there is no way to decrypt
                  SELECT DECRYPT_BIT(SSN,'TARZAN') AS SSN FROM EMP;


   49
DB2 9 for z/OS: Encryption in Transit

          DB2 9 supports SSL by implementing z/OS
           Communications Server IP Application Transparent
           Transport Layer Security (AT-TLS)
          AT-TLS performs transport layer security on behalf of
           DB2 for z/OS by invoking the z/OS system SSL in the
           TCP layer of the TCP/IP stack
          When acting as a requester, DB2 for z/OS can request
           a connection using the secure port of another DB2
           subsystem
          When acting as a server, and from within a trusted
           context SSL encryption can be required for the
           connection

50
Auditing

     In a world replete with
     regulations and threats,
     organizations have to go well
     beyond securing their data.
     Essentially, they have to
     perpetually monitor their data in
     order to know who or what did
     exactly what, when and how –- to
     all their data.
           Source: Audit the Data – or Else:
                   Un-audited Data Access Puts Business at High Risk.
                   Baroudi-Bloor, 2004.




     HIPAA, for example, requires
     patients to be informed any time
     someone has even looked at their
     data.

51
Regulations Impacting Database Auditing
                                                                             ISO
                 Audit                   CobiT   PCI           CMS          17799
                                                                                             NIST
                                                       HIPAA         GLBA            NERC   800-53
                                         (SOX)   DSS           ARS          (Basel
        Requirements                                                         II)
                                                                                            (FISMA)

     1. Access to Sensitive
                                                                                            
     Data (Successful/Failed                                             
                                                                                            (OMB)
     SELECTs)

     2. Schema Changes (DDL)
                                                                                          
     (Create/Drop/Alter Tables, etc.)

     3. Data Changes (DML)
                                                                           
     (Insert, Update, Delete)
     4. Security Exceptions
                                                                                         
     (Failed logins, SQL errors, etc.)
     5. Accounts, Roles &
                                                                                         
     Permissions (Entitlements)


52
Database and Data Access Auditing

     An audit is an evaluation of an organization,
     system, process, project or product.
          Database Control Auditing
            —   Who can do what (who has the authority)
                     GRANT, REVOKE, RACF/ACF2/Top Secret
          Data Access Auditing
            —   Who did do what
            —   INSERT, UPDATE, DELETE
            —   SELECT
            —   Database Object Auditing
                     DCL: GRANT, REVOKE
53
                     DDL: CREATE, DROP
Key Stakeholder Requirements




         SECURITY
        OPERATIONS

      Real-time policies    Separation of duties      Minimal impact
      Secure audit trail    Best practices reports    Change management
      Data mining &         Automated controls        Performance
       forensics



                            100% Visibility &
                              Unified View


54
How to Audit Database Access?



     1.   Audit trails in tables

     2.   Native DBMS traces

     3.   Log-based

     4.   Network sniffing

     5.   Capture requests at the server

55
Audit Trails in Tables

     Sometimes the first “knee jerk” reaction is to add
     “audit columns” to tables, such as:
     LAST_MODIFIED_DATE

     Auditors don’t like this; it is a problem because:
          Audit trails should be kept outside of the database
           (because if you delete the row you lose the audit data)
          How can you guarantee that the last modified data is
           completely accurate?
            —   Couldn’t someone have set it by accident (or
                nefariously)?

56
Native DBMS Audit

     The native DBMS audit capability may not be optimal:

           Separation of duties – logging typically is turned on
            and off by DBAs, who need to be audited
           Overhead – many require traces to be started,
            which can consume precious resources (as much as
            10% overhead?)
           Comprehensive capture – may not capture
            everything that needs to be captured for
            compliance




57
DB2 Audit Trace

         The DB2 Audit Trace can record:
               Changes in authorization IDs
               Changes to the structure of data (such as dropping a table)
               Changes to data values (such as updating or inserting data)
               Access attempts by unauthorized IDs
               Results of GRANT statements and REVOKE statements
               Mapping of Kerberos security tickets to IDs
               Other activities that are of interest to auditors

         Audit Trace Classes are listed on page 287, Admin Guide
     CREATE TABLE . . . AUDIT ALL . . .
58
     -START TRACE (AUDIT) CLASS (4,6) DEST (GTF) LOCATION (*)
Limitations of the audit trace

     The audit trace doesn’t record everything:

     s   Auditing takes place only when the audit trace is on.

     s   The trace does not record old data after it is changed (the log records old data).

     s   If an agent or transaction accesses a table more than once in a single unit of
         recovery, the audit trace records only the first access.

     s   The audit trace does not record accesses if you do not start the audit trace for
         the appropriate class of events.

     s   The audit trace does not audit some utilities. The trace audits the first access of
         a table with the LOAD utility, but it does not audit access by the COPY,
         RECOVER, and REPAIR utilities. The audit trace does not audit access by stand-
         alone utilities, such as DSN1CHKR and DSN1PRNT.

     s   The trace audits only the tables that you specifically choose to audit.

     s   You cannot audit access to auxiliary tables.

     s   You cannot audit the catalog tables because you cannot create
59
         or alter catalog tables.
What About Using the Log?

     Database transaction log(s) capture ALL* changes made to data.


                    DBMS
                                                      Database


                                       SQL
                                     Changes




                              Transaction Log(s)

60
     *
         Well, maybe not all changes, all the time.
Issues With Database Log Auditing & Analysis
        Log format is proprietary
        Volume can be an issue
        Easy access to online and archive logs?
          —   But how long do you keep your archive logs?
        Dual usage of data could cause problems?
          —   Recovery and protection
          —   Audit
        Tracks database modifications, but what about reads?
          —   Transaction logs do not record information about SELECT.
        And what about non-logged operations?
          —   LOAD LOG NO, REORG LOG NO
          —   Non-logged table spaces (new feature in DB2 9 for z/OS)
        Cannot invoke real-time actions using log-based auditing


61
Network Capture                (aka Network Sniffers)




     Database auditing via network sniffing captures SQL
     requests as they go across the network.
          But not all requests go across the wire
            —   Mainframe applications
            —   DBA access directly on the server
          Be careful, many third-party database auditing solutions
           use this approach



62
A Better Approach

        Audit database calls at the server
         —   Capture all SQL requests at the server
         —   All SQL access is audited, not just network calls
         —   Retain all pertinent audited information
                 No reliance on the DBMS
         —   No need to keep the active/archive log files
         —   No need to start a DBMS trace
         —   No need to modify the database schema
         —   Must be selective, comprehensive, and non-invasive
         —   Requires purchasing additional ISV software



63
Server-Based Database Auditing Requirements

     Surveillance Mechanism
          Selective – must be rules-based to enable the
           capture of audit details only on the specific
           data that requires auditing.
          Comprehensive – must be able to capture the
           complete scenario of auditable information.
          Non-invasive – must be able to audit access to
           data without incurring expensive performance
           degradation.




64
Auditing Has to be at the Server Level


     If you are not capturing all pertinent access
     requests at the server level, nefarious users can
     sneak in and not be caught.




65
On the Need to Monitor Privileged Users




66
Data Masking




67
The Problem

     Data is required to test application designs.
          Data (or reports) may also need to be sent to other individuals,
           or organizations, on an on-going basis for various purposes.

     Some of the data is sensitive and should not be
     accessible by programmers:
          PII such as SSN, salary, credit card details, etc.

     Referential integrity must be maintained in test,
     even as data values are changed.

68
The Solution

     Data masking is the process of protecting
     sensitive information in non-production databases
     from inappropriate visibility.

     Valid production data is replaced with useable,
     referentially-intact but incorrect and invalid data.

     After masking, the test data is usable just like
     production; but the information content is secure.
          Masking in the database or to the reports…
     May need to create and populate test data from
     scratch, as well as sanitize existing information.

69
Data Masking in action

           Masking must change names, credit card and telephone numbers
           (invalid), e-mail addresses (invalid), postal addresses (including
           street names, zip codes, and postal codes), false company
           names, and so on.



       191-64-9180                                    275-99-0194

Craig S. Mullins                                         John Q. Public

                                                   Pittsburgh, PA 15230
Sugar Land, TX 77478

  70
What PII Might Need to be Masked?




71
How Data Masking Protects Data

     If the data has been sanitized by
     masking it, it won’t matter if
     thieves gain access to it.




72
Management & Admin Procedures


     Are changes made to your
     database environment using
     standard methods and in a
     controlled manner?


     Are your databases properly
     backed up and recoverable
     within the timeframe
     mandated by your business
     (and any regulations)?



73
CobiT and Backup & Recovery

     COBIT and Recoverability

     DS1    Define and Manage Service Levels

            Recovery Time Objectives = recovery SLAs

     DS4    Ensure Continuous Service

            Prove recoverability and therefore, data availability

     DS11   Manage Data

            Ensures back ups are available for recovery




74
CobiT and Change Management

     Control Objectives
          Changes to data structures are authorized, made in
           accordance with design specifications and are
           implemented in a timely manner.
          Changes to data structures are assessed for their impact
           on financial reporting processes.



     “Unauthorized change is one of the best (and worst) ways to get
     your auditor’s attention.”
                           Source: Scheffy, Brasche, & Greene,
                                  IT Compliance for Dummies,
                                   (2005, Wiley, ISBN 0-471-75280-0)
75
Compliance Requirement for
           Database Change Management
       Changes to the database are widely communicated, and their impacts are known beforehand.
       Installation and maintenance procedure documentation for the DBMS is current.
       Data structures are defined and built as the designer intended them to be.
       Data structure changes are thoroughly tested.
       Users are apprised, and trained if necessary, when database changes imply a change in
       application behavior.
       The table and column business definitions are current and widely known.
       The right people are involved throughout the application development and operational cycles.
       Any in-house tools are maintained and configured in a disciplined way.
       Application impacts are known prior to the migration of database changes to production.
       Performance is maintained at predefined and acceptable levels.
       The database change request and evaluation system is rational.
       Turn-around time on database changes is predictable.
       Any change to the database can be reversed.
       Database structure documentation is maintained.
       Database system software documentation is maintained.
       Migration through development, test, and especially, production environments is rational.
       Security controls for data access is appropriate and maintained.
       Database reorganizations are planned to minimize business disruption.
76   Source: SOX Requirements for DBAs in Plain English by James McQuade
     http://www.dbazine.com/ofinterest/oi-articles/mcquade2
Database Change Management
     Databases protected with controls to prevent unauthorized changes
           Proper security for DBAs - including access to tools
     Ensure controls maintained as changes occur in applications, software,
     databases, personnel
           Maintain user ids, roles, access
           Ability for replacement personnel to perform work
           Test processes
           Change control logs to prove what you said was done, has been done
           Backout procedures
           Reduce system disruptions
           Accurate and timely reporting of information
     Routine, non-routine, emergency process defined and documented
           Complex and trivial changes follow the same procedures?

77
And it all Requires…


     As data volume expands and more regulations hit
     the books, metadata will increase in importance
          Metadata: data about the data
          Metadata characterizes data. It is used to provide
           documentation such that data can be understood and
           more readily consumed by your organization.
           Metadata answers the who, what, when, where,
           why, and how questions for users of the data.

     Data without metadata is meaningless
       
           Consider: 27, 010110, JAN
78
Data Categorization

     Data categorization is critical
          Metadata is required to place the data into proper
           categories for determining which regulations apply
            —   Financial data  SOX
            —   Health care data  HIPAA
            —   Etc.
          Some data will apply to multiple regulations
          Who does this now at your company? Anyone?




79
Convergence of DBA and DM
        Database Administration                  Data Management
           —   Backup/Recovery                       —   Database Security
           —   Disaster Recovery                     —   Data Privacy Protection
           —   Reorganization                        —   Data Quality Improvement
           —   Performance Monitoring                —   Data Quality Monitoring
           —   Application Call Level Tuning         —   Database Archiving
           —   Data Structure Tuning                 —   Data Extraction
           —   Capacity Planning                     —   Metadata Management




     Managing the database environment         Managing the content and uses of data




80
So, What is the Impact of Regulatory Compliance?


     Data Management vs. Database Administration
          Data Governance

     Business acumen vs. bits-and-bytes
          Can’t abandon technical skills, but must add more
           soft skills to your bag of tricks

     Communication and Inter-organizational
     Cooperation
          IT, Lines of Business, Legal

81
Forecast: DBA challenges


Performance and tuning




Patch/upgrade


                                          B&R
       Security
2002      2003    2004   2005   2006   2007     2008   2009   2010
82
Challenges: Compliance & Database Management




     Source: Unisphere Research, OAUG Automating Compliance 2006 Survey
83
Web References
     Industry Organizations and References
          www.itcinstitute.com
          www.isaca.org
          www.coso.org
          www.aicpa.org/news/2004/2004_0929.htm
          www.auditnet.org/sox.htm
          www.itgi.org
          www.sox-online.com/coso_cobit.html
          www.bis.org/publ/bcbs107.htm - (Basel II)
          www.snia-dmf.org/100year
          https://www.pcisecuritystandards.org/
84
Some Recommended Books

         Implementing Database Security and Auditing by Ron
          Ben Natan (2005, Elsevier Digital Press, ISBN: 1-55558-334-2)
         Manager’s Guide to Compliance by Anthony Tarantino
          (2006, John Wiley & Sons, ISBN: 0-471-79257-8)
         IT Compliance for Dummies by Clark Scheffy, Randy
          Brasche, & David Greene (2005, Wiley Publishing, Inc., ISBN:
          0-471-75280-0)
         Cryptography in the Database: The Last Line of
          Defense by Kevin Kenan (2006, Addison-Wesley, ISBN:
          0321-32073-5)
         Electronic Evidence and Discovery: What Every
          Lawyer Should Know by Michele C.S. Lange and
          Kristin M. Nimsger (2004, ABA Publishing, ISBN:
          1-59031-334-8)
85
Craig S. Mullins
      NEON Enterprise Software
     craig.mullins@neonesoft.com


         www.neonesoft.com
         www.craigsmullins.com
          www.DB2portal.com




86

More Related Content

What's hot

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware AnalysisAlbert Hui
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
Big data Analytics
Big data AnalyticsBig data Analytics
Big data AnalyticsTUSHAR GARG
 
Big data
Big dataBig data
Big datahsn99
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understandingHelpWithAssignment.com
 
Streaming computing: architectures, and tchnologies
Streaming computing: architectures, and tchnologiesStreaming computing: architectures, and tchnologies
Streaming computing: architectures, and tchnologiesNatalino Busa
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securitySherief Elmetwali
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 

What's hot (20)

The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Information Security
Information SecurityInformation Security
Information Security
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Healthcare fraud detection
Healthcare fraud detectionHealthcare fraud detection
Healthcare fraud detection
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Big data Analytics
Big data AnalyticsBig data Analytics
Big data Analytics
 
Big data
Big dataBig data
Big data
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understanding
 
Streaming computing: architectures, and tchnologies
Streaming computing: architectures, and tchnologiesStreaming computing: architectures, and tchnologies
Streaming computing: architectures, and tchnologies
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It security
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 

Similar to The Impact of Regulations on Database Administration

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryptionNeoCertified
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docxdrennanmicah
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptSamir Jha
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentBill Lisse
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
Information security legislation
Information security legislationInformation security legislation
Information security legislationstuimrozsm
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Lance Michalson
 

Similar to The Impact of Regulations on Database Administration (20)

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx115  By Robert Smallwood with Randy   Kahn,Esq.   , and .docx
115 By Robert Smallwood with Randy Kahn,Esq. , and .docx
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Dc fcpa tour final ho
Dc fcpa tour final hoDc fcpa tour final ho
Dc fcpa tour final ho
 
ISSA Data Retention Policy Development
ISSA Data Retention Policy DevelopmentISSA Data Retention Policy Development
ISSA Data Retention Policy Development
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Information security legislation
Information security legislationInformation security legislation
Information security legislation
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
 
Cybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protectionsCybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protections
 

More from Craig Mullins

Db2 and storage management (mullins)
Db2 and storage management (mullins)Db2 and storage management (mullins)
Db2 and storage management (mullins)Craig Mullins
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsCraig Mullins
 
DB2 UDB for z/OS Version 7 - An Overview
DB2 UDB for z/OS Version 7 - An OverviewDB2 UDB for z/OS Version 7 - An Overview
DB2 UDB for z/OS Version 7 - An OverviewCraig Mullins
 
The Five R's: There Can be no DB2 Performance Improvement Without Them!
The Five R's: There Can be no DB2 Performance Improvement Without Them!The Five R's: There Can be no DB2 Performance Improvement Without Them!
The Five R's: There Can be no DB2 Performance Improvement Without Them!Craig Mullins
 
DB2 V8 - For Developers Only
DB2 V8 -  For Developers OnlyDB2 V8 -  For Developers Only
DB2 V8 - For Developers OnlyCraig Mullins
 
DB2 V10 Migration Guidance
DB2 V10 Migration GuidanceDB2 V10 Migration Guidance
DB2 V10 Migration GuidanceCraig Mullins
 
DB2 and storage management
DB2 and storage managementDB2 and storage management
DB2 and storage managementCraig Mullins
 

More from Craig Mullins (11)

Db2 and storage management (mullins)
Db2 and storage management (mullins)Db2 and storage management (mullins)
Db2 and storage management (mullins)
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
 
The Tao of DB2
The Tao of DB2The Tao of DB2
The Tao of DB2
 
DB2 UDB for z/OS Version 7 - An Overview
DB2 UDB for z/OS Version 7 - An OverviewDB2 UDB for z/OS Version 7 - An Overview
DB2 UDB for z/OS Version 7 - An Overview
 
The Five R's: There Can be no DB2 Performance Improvement Without Them!
The Five R's: There Can be no DB2 Performance Improvement Without Them!The Five R's: There Can be no DB2 Performance Improvement Without Them!
The Five R's: There Can be no DB2 Performance Improvement Without Them!
 
An Hour of DB2 Tips
An Hour of DB2 TipsAn Hour of DB2 Tips
An Hour of DB2 Tips
 
DB2 V8 - For Developers Only
DB2 V8 -  For Developers OnlyDB2 V8 -  For Developers Only
DB2 V8 - For Developers Only
 
DBA101
DBA101DBA101
DBA101
 
Db trends final
Db trends   finalDb trends   final
Db trends final
 
DB2 V10 Migration Guidance
DB2 V10 Migration GuidanceDB2 V10 Migration Guidance
DB2 V10 Migration Guidance
 
DB2 and storage management
DB2 and storage managementDB2 and storage management
DB2 and storage management
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

The Impact of Regulations on Database Administration

  • 1. The Impact of Regulatory Compliance on Database Administration Craig S. Mullins Corporate Technologist NEON Enterprise Software, Inc.
  • 2. Authors This presentation was prepared by: Craig S. Mullins Corporate Technologist NEON Enterprise Software, Inc. 14100 Southwest Freeway, Suite 400 Sugar Land, TX 77478 Tel: 281.491.6366 Fax: 281.207.4973 E-mail: craig.mullins@neonesoft.com This document is protected under the copyright laws of the United States and other countries as an unpublished work. This document contains information that is proprietary and confidential to NEON Enterprise Software, which shall not be disclosed outside or duplicated, used, or disclosed in whole or in part for any purpose other than to evaluate NEON Enterprise Software products. Any use or disclosure in whole or in part of this information without the express written permission of NEON Enterprise Software is prohibited. © 2006 NEON Enterprise Software (Unpublished). All rights reserved. 2
  • 3. Agenda An Overview of Government Regulations and Issues Impacts on Data and Database Management  Data Quality  Long-term Data Retention  Database Security  Database and Data Access Auditing  Data Masking  Controls on DBA Procedures — Backup & Recovery — Change Management  Metadata Management 3
  • 4. Compliance Continues to Exert Pressure Increasing compliance pressure. Compliance requirements, such as Sarbanes-Oxley, HIPAA, CA SB 1386, and the Gramm-Leach-Bliley Act (GLBA), are driving interest for all enterprises to take strong security measures to protect private data. These include initiatives around data-at-rest encryption, granular auditing, intrusion detection and prevention, and end-to- end security measures. Source: Trends 2006: Database Management Systems, Forrester Research 4
  • 5. Regulatory Compliance GLB HIPAA PCI-DSS Basel II Sarbanes-Oxley CA SB1386 Federal Information Security Management Act “Red Flag” Rules (FRCA) 5
  • 6. Legislation & Compliance The Gramm-Leach-Bliley Act (GLB), is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals. The Act regulates the collection and disclosure of private financial information; stipulates safeguards requiring security programs; and prohibits the practice of pretexting. HIPAA (Health Insurance Portability and Accountability Act) creates national standards to protect individuals' medical records & personal health information. The Privacy Rule provides that, in general, a covered entity may not use or disclose an individual’s healthcare information without permission except for treatment, payment, or healthcare operations. PCI DSS (Payment Card Industry Data Security Standard) includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data. 6
  • 7. Legislation & Compliance Basel II is an international banking regulation the goal of which is to produce uniformity in the way banks and banking regulators approach risk management across national borders. The Sarbanes-Oxley Act (SOX) establishes standards for all U.S. public company boards, management, and public accounting firms. The Section Public Company Accounting Oversight Board (PCAOB) was created by 404 SOX to oversee auditors of public companies. The primary goals of SOX were to strengthen and restore public confidence in corporate accountability and to improve executive responsibility. The California Security Breach Notification Law (CA SB 1386) requires companies to notify California customers if PII maintained in computerized data files have been compromised by unauthorized access. 7
  • 8. FISMA: Federal Information Security Mgmt Act Title III of the E-Government Act, FISMA basically states that federal agencies, contractors, and any entity that supports them, must maintain security commensurate with potential risk. The Fair and Accurate Credit Transactions Act of 2003 (FACTA), requires all federally regulated financial institutions to be in full compliance by Nov. 1, 2008. This is also known as the "Red Flag" rules.  Requires that financial institutions and creditors develop and deploy an Identity Theft Prevention Program for combating ID theft on new and existing accounts. 8
  • 9. Other Regulations & Issues? And, there are more regulations to consider, for example:  the USA Patriot Act  Can SPAM Act of 2003  Telecommunications Act of 1996  The Data Quality Act And, there are more regulations to contend with; based upon your industry, location, etc. As well as, new regulations that will continue to be written by government and imposed over time… Regulations have brought to light some of the personal financial information that has been compromised (stolen)  More on this later… 9
  • 10. Regulatory Compliance is International Country Examples of Regulations Australia Commonwealth Government’s Information Exchange Steering Committee, Evidence Act 1995, more than 80 acts governing retention requirements Brazil Electronic Government Programme, EU GMP Directive 1/356/EEC-9 Canada Bill 198, Competition Act, France Model Requirements for the Management of Electronic Records, EU Directive 95/46/EC Germany Federal Data Protection Act, Model Requirements for the Management of Electronic Records, EU Directive 95/46/EC Japan Personal Data Protection Bill, J-SOX Switzerland Swiss Code of Obligations articles 957 and 962 United Data Protection Act, Civil Evidence Act 1995, Police and Criminal Evidence Act Kingdom 1984, Employment Practices Data Protection Code, Combined Code on Corporate Governance 2003 10
  • 12. Regulations Impacting Security Governance vs. Privacy Governance Privacy • • EU DPD Basel II • • AU/NZ NPP Sarbanes Oxley • • SB 1386/AB 1950 OFAC • • GLBA Turnbull Report • HIPAA • PCI • FCRA -- “Red Flag” Protect and control the process Protect the data 12
  • 14. Regulatory Compliance and… Impact: upper-level management is keenly aware of the need to comply, if not all of the details that involves. Prosecution: being successfully prosecuted (see next slide) can result in huge fines and even imprisonment. Cost: cost of complete compliance can be significant, but so can the cost of non-compliance. No longer easier just to ignore problems. Durability: although there have been discussions about scaling back some laws (e.g. SOX), increasing regulations and therefore increasing time, effort, and capital will be spent on compliance.  That is, the issue will not just disappear if you ignore it long enough! But, at the end of the day, ensuring exact compliance can be a gray area. 14
  • 15. The Reality of Prosecution Enron – In May 25, 2006 Ken Lay (former CEO) was found guilty of 10 counts against him. Because each count carried a maximum 5- to 10-year sentence, Lay could have faced 20 to 30 years in prison. However, he died while vacationing in about three and a half months before his scheduled sentencing. Jeff Skilling (another former CEO) was found guilty of 19 out of 28 counts against him, including one count of conspiracy, one count of insider trading. Skilling was sentenced to 24 years and 4 months in federal prison. WorldCom – In June 2005, 800,000 investors were awarded $6 billion in settlements; the payouts will be funded by the defendants in the case, including investment banks, audit ROI? firms, and the former directors of WolrdCom. The judge in the case noted that the settlements were “of historic proportions.” Additionally, Bernard Ebbers, former CEO of WorldCom, was convicted of fraud and sentenced to 25 years in prison. Tyco – In September 2005, Dennis Kozlowski (former Tyco CEO) and Mark Swartz (former Tyco CFO) were sentenced to 8 to 25 years in prison for stealing hundreds of millions of dollars from Tyco. Additionally, Kozlowski had to pay $70 million in restitution; Swartz $35 million. Adelphia – In June 2005, John Rigas (founder and former CEO) was sentenced to 15 years in prison; his son, Tony, was also convicted of bank fraud, securities fraud, & conspiracy - he received a 20 year sentence. HealthSouth – In March 2005, Richard Scrushy, founder and former CEO, was acquitted of charges relating to 1 $2.7 billion earnings over-statement. Scrushy blamed his subordinates for the fraud… 15
  • 16. But Business Benefits Do Exist Source: Unisphere Research, OAUG Automating Compliance 2006 Survey 16
  • 17. Why Should DBAs Care About Compliance? Compliance starts with the CEO…  But the CEO relies on the CIO to ensure that IT processes are compliant  And the CIO relies on the IT managers  One of whom (DBA Manager) controls the database systems — Who relies on DBAs to ensure that data is protected and controlled. 17
  • 18. So What Do Data Mgmt Folks Need to Do? Implement standard controls and methods for improving:  Data Quality  Long-term Data Retention  Database Security  Database and Data Access Auditing  Data Masking  Backup & Recovery 18  DBA Procedures
  • 19. Issue #1: Data Quality A recent SAS/Risk Waters Group survey indicated that 93% of respondents had experienced losses of $10 million in one year…  And 21% of respondents said that at some point, their company suffered a loss between $10,000 and $1,000,000 in a single day. The prime reasons given for such losses were incomplete, inaccurate or obsolete data, and inadequate processes. Source: Gartner (April 2006) 19
  • 20. Examples of Data Quality Regulations The Data Quality Act  Careful, it sounds better than it actually is.  Written by an industry lobbyist and slipped into a giant appropriations bill in 2000 without congressional discussion or debate  Basically consists of two sentences directing the OMB to ensure that all information disseminated by the federal government is reliable. Sarbanes-Oxley  Financial reports must be ACCURATE  Without good data quality this is impossible. 20
  • 21. Data Quality: Is it Really a Major Concern? How good is your data quality? Estimates show that, on average, data quality is suspect:  Payroll record changes have a 1% error rate;  Billing records have a 2-7% error rate, and;  The error rate for credit records: as high as 30%. Source: T.C. Redman, Data Quality: Management and Technology, (New York, Bantam Books). Similar studies in Computer World and the Wall Street Journal back up the notion of overall poor data quality.  W.M. Bulkeley, "Databases Are Plagued by Reign of Error," The Wall Street Journal, 26 May 1992, B2.  B. Knight, "The Data Pollution Problem," ComputerWorld, 28 September 1992, 81-84. 21
  • 22. The High Cost of Poor Quality Data “Poor data quality costs the typical company at least ten percent (10%) of revenue; twenty percent (20%) is probably a better estimate.” Source: Thomas C. Redman, “Data: An Unfolding Quality Disaster”, DMReview Magazine, August 2004 Valid & Accurate? 22
  • 23. Database Constraints By building constraints into the database, overall data quality may be improved:  Referential Integrity — Primary Key — Foreign Key(s)  UNIQUE constraints  CHECK constraints  Triggers  Domains 23
  • 24. Data Profiling With data profiling, you can:  Discover the quality, characteristics and potential problems of information before beginning data-driven projects  Drastically reduce the time and resources required to find problematic data  Allow business analysts and data stewards to have more control on the maintenance and management of enterprise data  Catalog and analyze metadata and discover metadata relationships 24
  • 25. Issue #2: Long-Term Data Retention The average installed storage capacity at Fortune 1000 corporations has grown from 198TB to 680TB in less than two years. This is a growth rate of more than 340% as capacity continues to double every 10 months. Source: TIP (TheInfoPro). 2006 www.theinfopro.net 25
  • 26. More Data, Stored for Longer Durations Data Retention Issues: Volume of data (125% CAGR) Length of retention n requirement io ct Amount of Data e r ot Varied types of data P e a nc Security issues i pl C om 0 Time Required 30+ Yrs 26
  • 27. Data Retention Drives Data(base) Archiving Data Retention Requirements refer to the length of time you need to keep data Determined by laws – regulatory compliance   More than 150 state and federal laws  Dramatically increasing retention periods for corporate data Determined by business needs   Reduce operational costs  Large volumes of data interfere with operations: performance, backup/recovery, etc.  Isolate content from changes 27  Protect archived data from
  • 28. Regulatory Compliance & Data Retention Requirements 28
  • 29. Can You Read This? 29
  • 30. E-Discovery Electronic evidence is the predominant form of discovery today. (Gartner,Research Note G00136366) Electronic evidence could encompass anything that is stored anywhere. (Gartner,Research Note G00133224) When data is being collected (for e-discovery) it is imperative that it is not changed in any way. Metadata must be preserved… (Gartner,Research Note G00133224) Gartner Strategic Planning Assumption: Through 2007, more than half of IT organizations and in-house legal departments will lack the people and the appropriate skills to handle electronic discovery requirements (0.8 probability). (Gartner,Research Note G00131014) 30
  • 31. E-Discovery and the FRCP Federal Rules of Civil Procedure, Rule 34b  Took effect December 2006  A party who produces documents for inspection shall produce them . . . as they are kept in the usual course of business..."  The amended rules state that requested information must be turned over within 120 days after a complaint has been served. So data stored in database systems must be able to be produced in electronic form. 31
  • 32. What “Solutions” Are Out There?  Keep Data in Operational Database — Problems with authenticity of large amounts of data over long retention times — Operational performance degradation  Store Data in UNLOAD files (or backups) — Problems with schema change and reading archived data — Using backups poses even more serious problems  Move Data to a Parallel Reference Database — Combines problems of the previous two  Move Data to a Database Archive 32
  • 33. Components of a Database Archiving Solution Database Archiving: The process of removing selected data records from operational databases Purge that are not expected to be referenced again and Databases storing them in an archive data store where they can be retrieved if needed. Data Data Extract Recall Metadata Archive data store and retrieve capture, design, maintenance Archive data Archive query and access metadata data policies metadata history Archive administration 33
  • 34. Issue #3: Data and Database Security 75% of enterprises do not have a DBMS security plan. Source: Forrester Research, “Your DBMS Strategy 2005” A single intrusion that compromises private data can cause immense damage to the reputation of an enterprise — and in some cases financial damage as well. Source: Forrester Research, “Comprehensive Database Security…” Database configurations are not secure by default, and they often require specialized knowledge and extra effort to ensure that configuration options are set in the most secure manner possible. Source: Forrester Research, “Comprehensive Database Security…” 34
  • 35. Obstacles to Database Security Source: Forrester Research, “Comprehensive Database Security…” 35
  • 36. Database Security By the Numbers s 67% of 1,100 security pros said securing databases was an important or very important challenge for 2008 — #1 in a list of 13 data protection initiatives s 45% of security pros will spend more time on data protection in 2008 vs. 2007. — #3 on a list of 19 security activities s 41% will spend more time on database security specifically Source: TechTarget 36
  • 37. What is a Data Breach? 37
  • 38. Data Breaches: A Threat to Your Data Privacy Rights Clearinghouse http://www.privacyrights.org/ar/ChronDataBreaches.htm Since 2005:  In excess of 230 million total records containing sensitive personal information were exposed due to data security breaches… — ChoicePoint: (Feb 15, 2005) – data on 165,000 customers breached — Since then, there have been 230,454,030 total records breached that contained sensitive personal information* * As of June 30, 2008 38 * As of Feb 27, 2007, reported by http://www.privacyrights.org/ar/ChronDataBreaches.htm
  • 39. How Prevalent is this Problem? 68% of companies are losing sensitive data or having it stolen out from under them six times a year An additional 20% are losing sensitive data 22 times or more per year. Sources: eWeek, March 3, 2007 IT Policy Compliance Group http://www.eweek.com/c/a/Desktops-and-Notebooks/Report-Some-Companies-Lose-Data-Six-Times-a-Year/ 39
  • 40. The Cost of a Data Breach According to Forrester Research, the average cost per record is between $90 and $305 According to the Ponemon Institute, the average cost per lost customer record is $182  Average cost per incident: $5 million Or use the Data Loss Calculator, free on the web at http://www.tech-404.com/calculator.html 40
  • 41. Most Prevalent Causes of Data Loss 41
  • 42. Database Security Issues in a Nutshell Authentication  Who is it? Authorization  Who can do it? Encryption  Who can see it? Audit  Who did it? 42
  • 43. Security From a DB2 Perspective 43
  • 44. 44
  • 45. Database Security Who has access to high-level “roles”: Install SYSADM, SYSADM, SYSCTRL, DBADM, etc. Auditors will have issues with this, but it is difficult, if not impossible, to remove. Do any applications require DBA-level authority? Why? Security monitoring  Data Access Auditing (more on this in a moment)  Additional tools 45
  • 46. SYSADM and Install SYSADM Install SYSADM bypasses the DB2 Catalog when checking for privileges.  So, there are no limits on what a user with Install SYSADM authority can do.  And it can only be removed by changing DSNZPARMs  Basically, needed for catalog and system “stuff” SYSADM is almost as powerful, but:  It can be revoked  Biggest problem for auditors: SYSADM has access to all data in all tables. 46
  • 47. Suggestions • Limit the number of SYSADMs  And audit everything those users do. • Consider associating Install SYSADM with a group (RACF)  Authids that absolutely need Install SYSADM can be connected to the group using secondary authids. • Similar issues with SYSOPR and Install SYSOPR 47
  • 48. Data Encryption Considerations California's SB 1386 protects personally identifiable information; obviously it doesn't matter if encrypted data becomes public since it's near impossible to decrypt. Source: “Encryption May Help Regulatory Compliance” Edmund X. DeJesus, SearchSecurity.com Types of encryption  At Rest  In Transit Issues  Performance — Encrypting and decrypting data consumes CPU  Applications may need to be changed — See next slide for DB2 V8 encryption functions 48
  • 49. DB2 V8: Encryption / Decryption Encryption: to encrypt the data for a column ENCRYPT_TDES(string, password, hint)  ENCRYPT_TDES [can use ENCRYPT() as a synonym for compatibility] Exit  Triple DES cipher block chaining (CPC) encryption algorithm Routine? — Not the same algorithm used by DB2 on other platforms  128-bit secret key derived from password using MD5 hash INSERT INTO EMP (SSN) VALUES(ENCRYPT('289-46-8832','TARZAN','? AND JANE')); Decryption: to decrypt the encrypted data for a column DECRYPT_BIT(), DECRYPT_CHAR(), DECRYPT_DB()  Can only decrypt expressions encrypted using ENCRYPT_TDES — Can have a different password for each row if needed  Without the password, there is no way to decrypt SELECT DECRYPT_BIT(SSN,'TARZAN') AS SSN FROM EMP; 49
  • 50. DB2 9 for z/OS: Encryption in Transit  DB2 9 supports SSL by implementing z/OS Communications Server IP Application Transparent Transport Layer Security (AT-TLS)  AT-TLS performs transport layer security on behalf of DB2 for z/OS by invoking the z/OS system SSL in the TCP layer of the TCP/IP stack  When acting as a requester, DB2 for z/OS can request a connection using the secure port of another DB2 subsystem  When acting as a server, and from within a trusted context SSL encryption can be required for the connection 50
  • 51. Auditing In a world replete with regulations and threats, organizations have to go well beyond securing their data. Essentially, they have to perpetually monitor their data in order to know who or what did exactly what, when and how –- to all their data. Source: Audit the Data – or Else: Un-audited Data Access Puts Business at High Risk. Baroudi-Bloor, 2004. HIPAA, for example, requires patients to be informed any time someone has even looked at their data. 51
  • 52. Regulations Impacting Database Auditing ISO Audit CobiT PCI CMS 17799 NIST HIPAA GLBA NERC 800-53 (SOX) DSS ARS (Basel Requirements II) (FISMA) 1. Access to Sensitive  Data (Successful/Failed      (OMB) SELECTs) 2. Schema Changes (DDL)        (Create/Drop/Alter Tables, etc.) 3. Data Changes (DML)    (Insert, Update, Delete) 4. Security Exceptions         (Failed logins, SQL errors, etc.) 5. Accounts, Roles &         Permissions (Entitlements) 52
  • 53. Database and Data Access Auditing An audit is an evaluation of an organization, system, process, project or product.  Database Control Auditing — Who can do what (who has the authority)  GRANT, REVOKE, RACF/ACF2/Top Secret  Data Access Auditing — Who did do what — INSERT, UPDATE, DELETE — SELECT — Database Object Auditing  DCL: GRANT, REVOKE 53  DDL: CREATE, DROP
  • 54. Key Stakeholder Requirements SECURITY OPERATIONS  Real-time policies  Separation of duties  Minimal impact  Secure audit trail  Best practices reports  Change management  Data mining &  Automated controls  Performance forensics 100% Visibility & Unified View 54
  • 55. How to Audit Database Access? 1. Audit trails in tables 2. Native DBMS traces 3. Log-based 4. Network sniffing 5. Capture requests at the server 55
  • 56. Audit Trails in Tables Sometimes the first “knee jerk” reaction is to add “audit columns” to tables, such as: LAST_MODIFIED_DATE Auditors don’t like this; it is a problem because:  Audit trails should be kept outside of the database (because if you delete the row you lose the audit data)  How can you guarantee that the last modified data is completely accurate? — Couldn’t someone have set it by accident (or nefariously)? 56
  • 57. Native DBMS Audit The native DBMS audit capability may not be optimal:  Separation of duties – logging typically is turned on and off by DBAs, who need to be audited  Overhead – many require traces to be started, which can consume precious resources (as much as 10% overhead?)  Comprehensive capture – may not capture everything that needs to be captured for compliance 57
  • 58. DB2 Audit Trace The DB2 Audit Trace can record:  Changes in authorization IDs  Changes to the structure of data (such as dropping a table)  Changes to data values (such as updating or inserting data)  Access attempts by unauthorized IDs  Results of GRANT statements and REVOKE statements  Mapping of Kerberos security tickets to IDs  Other activities that are of interest to auditors Audit Trace Classes are listed on page 287, Admin Guide CREATE TABLE . . . AUDIT ALL . . . 58 -START TRACE (AUDIT) CLASS (4,6) DEST (GTF) LOCATION (*)
  • 59. Limitations of the audit trace The audit trace doesn’t record everything: s Auditing takes place only when the audit trace is on. s The trace does not record old data after it is changed (the log records old data). s If an agent or transaction accesses a table more than once in a single unit of recovery, the audit trace records only the first access. s The audit trace does not record accesses if you do not start the audit trace for the appropriate class of events. s The audit trace does not audit some utilities. The trace audits the first access of a table with the LOAD utility, but it does not audit access by the COPY, RECOVER, and REPAIR utilities. The audit trace does not audit access by stand- alone utilities, such as DSN1CHKR and DSN1PRNT. s The trace audits only the tables that you specifically choose to audit. s You cannot audit access to auxiliary tables. s You cannot audit the catalog tables because you cannot create 59 or alter catalog tables.
  • 60. What About Using the Log? Database transaction log(s) capture ALL* changes made to data. DBMS Database SQL Changes Transaction Log(s) 60 * Well, maybe not all changes, all the time.
  • 61. Issues With Database Log Auditing & Analysis  Log format is proprietary  Volume can be an issue  Easy access to online and archive logs? — But how long do you keep your archive logs?  Dual usage of data could cause problems? — Recovery and protection — Audit  Tracks database modifications, but what about reads? — Transaction logs do not record information about SELECT.  And what about non-logged operations? — LOAD LOG NO, REORG LOG NO — Non-logged table spaces (new feature in DB2 9 for z/OS)  Cannot invoke real-time actions using log-based auditing 61
  • 62. Network Capture (aka Network Sniffers) Database auditing via network sniffing captures SQL requests as they go across the network.  But not all requests go across the wire — Mainframe applications — DBA access directly on the server  Be careful, many third-party database auditing solutions use this approach 62
  • 63. A Better Approach  Audit database calls at the server — Capture all SQL requests at the server — All SQL access is audited, not just network calls — Retain all pertinent audited information  No reliance on the DBMS — No need to keep the active/archive log files — No need to start a DBMS trace — No need to modify the database schema — Must be selective, comprehensive, and non-invasive — Requires purchasing additional ISV software 63
  • 64. Server-Based Database Auditing Requirements Surveillance Mechanism  Selective – must be rules-based to enable the capture of audit details only on the specific data that requires auditing.  Comprehensive – must be able to capture the complete scenario of auditable information.  Non-invasive – must be able to audit access to data without incurring expensive performance degradation. 64
  • 65. Auditing Has to be at the Server Level If you are not capturing all pertinent access requests at the server level, nefarious users can sneak in and not be caught. 65
  • 66. On the Need to Monitor Privileged Users 66
  • 68. The Problem Data is required to test application designs.  Data (or reports) may also need to be sent to other individuals, or organizations, on an on-going basis for various purposes. Some of the data is sensitive and should not be accessible by programmers:  PII such as SSN, salary, credit card details, etc. Referential integrity must be maintained in test, even as data values are changed. 68
  • 69. The Solution Data masking is the process of protecting sensitive information in non-production databases from inappropriate visibility. Valid production data is replaced with useable, referentially-intact but incorrect and invalid data. After masking, the test data is usable just like production; but the information content is secure.  Masking in the database or to the reports… May need to create and populate test data from scratch, as well as sanitize existing information. 69
  • 70. Data Masking in action Masking must change names, credit card and telephone numbers (invalid), e-mail addresses (invalid), postal addresses (including street names, zip codes, and postal codes), false company names, and so on. 191-64-9180 275-99-0194 Craig S. Mullins John Q. Public Pittsburgh, PA 15230 Sugar Land, TX 77478 70
  • 71. What PII Might Need to be Masked? 71
  • 72. How Data Masking Protects Data If the data has been sanitized by masking it, it won’t matter if thieves gain access to it. 72
  • 73. Management & Admin Procedures Are changes made to your database environment using standard methods and in a controlled manner? Are your databases properly backed up and recoverable within the timeframe mandated by your business (and any regulations)? 73
  • 74. CobiT and Backup & Recovery COBIT and Recoverability DS1 Define and Manage Service Levels Recovery Time Objectives = recovery SLAs DS4 Ensure Continuous Service Prove recoverability and therefore, data availability DS11 Manage Data Ensures back ups are available for recovery 74
  • 75. CobiT and Change Management Control Objectives  Changes to data structures are authorized, made in accordance with design specifications and are implemented in a timely manner.  Changes to data structures are assessed for their impact on financial reporting processes. “Unauthorized change is one of the best (and worst) ways to get your auditor’s attention.” Source: Scheffy, Brasche, & Greene, IT Compliance for Dummies, (2005, Wiley, ISBN 0-471-75280-0) 75
  • 76. Compliance Requirement for Database Change Management Changes to the database are widely communicated, and their impacts are known beforehand. Installation and maintenance procedure documentation for the DBMS is current. Data structures are defined and built as the designer intended them to be. Data structure changes are thoroughly tested. Users are apprised, and trained if necessary, when database changes imply a change in application behavior. The table and column business definitions are current and widely known. The right people are involved throughout the application development and operational cycles. Any in-house tools are maintained and configured in a disciplined way. Application impacts are known prior to the migration of database changes to production. Performance is maintained at predefined and acceptable levels. The database change request and evaluation system is rational. Turn-around time on database changes is predictable. Any change to the database can be reversed. Database structure documentation is maintained. Database system software documentation is maintained. Migration through development, test, and especially, production environments is rational. Security controls for data access is appropriate and maintained. Database reorganizations are planned to minimize business disruption. 76 Source: SOX Requirements for DBAs in Plain English by James McQuade http://www.dbazine.com/ofinterest/oi-articles/mcquade2
  • 77. Database Change Management Databases protected with controls to prevent unauthorized changes  Proper security for DBAs - including access to tools Ensure controls maintained as changes occur in applications, software, databases, personnel  Maintain user ids, roles, access  Ability for replacement personnel to perform work  Test processes  Change control logs to prove what you said was done, has been done  Backout procedures  Reduce system disruptions  Accurate and timely reporting of information Routine, non-routine, emergency process defined and documented  Complex and trivial changes follow the same procedures? 77
  • 78. And it all Requires… As data volume expands and more regulations hit the books, metadata will increase in importance  Metadata: data about the data  Metadata characterizes data. It is used to provide documentation such that data can be understood and more readily consumed by your organization. Metadata answers the who, what, when, where, why, and how questions for users of the data. Data without metadata is meaningless  Consider: 27, 010110, JAN 78
  • 79. Data Categorization Data categorization is critical  Metadata is required to place the data into proper categories for determining which regulations apply — Financial data  SOX — Health care data  HIPAA — Etc.  Some data will apply to multiple regulations  Who does this now at your company? Anyone? 79
  • 80. Convergence of DBA and DM  Database Administration  Data Management — Backup/Recovery — Database Security — Disaster Recovery — Data Privacy Protection — Reorganization — Data Quality Improvement — Performance Monitoring — Data Quality Monitoring — Application Call Level Tuning — Database Archiving — Data Structure Tuning — Data Extraction — Capacity Planning — Metadata Management Managing the database environment Managing the content and uses of data 80
  • 81. So, What is the Impact of Regulatory Compliance? Data Management vs. Database Administration  Data Governance Business acumen vs. bits-and-bytes  Can’t abandon technical skills, but must add more soft skills to your bag of tricks Communication and Inter-organizational Cooperation  IT, Lines of Business, Legal 81
  • 82. Forecast: DBA challenges Performance and tuning Patch/upgrade B&R Security 2002 2003 2004 2005 2006 2007 2008 2009 2010 82
  • 83. Challenges: Compliance & Database Management Source: Unisphere Research, OAUG Automating Compliance 2006 Survey 83
  • 84. Web References Industry Organizations and References  www.itcinstitute.com  www.isaca.org  www.coso.org  www.aicpa.org/news/2004/2004_0929.htm  www.auditnet.org/sox.htm  www.itgi.org  www.sox-online.com/coso_cobit.html  www.bis.org/publ/bcbs107.htm - (Basel II)  www.snia-dmf.org/100year  https://www.pcisecuritystandards.org/ 84
  • 85. Some Recommended Books  Implementing Database Security and Auditing by Ron Ben Natan (2005, Elsevier Digital Press, ISBN: 1-55558-334-2)  Manager’s Guide to Compliance by Anthony Tarantino (2006, John Wiley & Sons, ISBN: 0-471-79257-8)  IT Compliance for Dummies by Clark Scheffy, Randy Brasche, & David Greene (2005, Wiley Publishing, Inc., ISBN: 0-471-75280-0)  Cryptography in the Database: The Last Line of Defense by Kevin Kenan (2006, Addison-Wesley, ISBN: 0321-32073-5)  Electronic Evidence and Discovery: What Every Lawyer Should Know by Michele C.S. Lange and Kristin M. Nimsger (2004, ABA Publishing, ISBN: 1-59031-334-8) 85
  • 86. Craig S. Mullins NEON Enterprise Software craig.mullins@neonesoft.com www.neonesoft.com www.craigsmullins.com www.DB2portal.com 86

Editor's Notes

  1. These are the bullets from the abstract: * What are the Regulations? * Compliance Issues * IT Controls * Long-term Data Retention * Database Auditing * Additional DBA Concerns
  2. GLB regulates financial institutions and the manner in which financial data is collected, managed, and used. Pretexting is accessing private information under false pretenses. HIPAA regulates the privacy of health care information.
  3. Basel II regulates the banking industry to improve risk and asset management. The goal of the regulation is to avoid financial disasters by: Imposing minimum capital requirements Requiring supervisory review; and Promoting market discipline (to achieve greater stability in the financial system). SOX is the big one. The goal of SOX is to use the full authority of the government to expose corruption, punish wrongdoers, and defend the rights & interests of American workers & investors. Section 404 is the largest driver of SOX projects. It is the most important section for IT because the processes and internal controls are implemented primarily in IT systems; … and much of the data is stored in a DBMS. CA SB 1386 has resulted in many disclosures of breached data that otherwise would probably have never come to light. This law was a pioneer in helping to expose this big problem.
  4. Controlling the Assault of Non-Solicited Pornography and Marketing (Can SPAM). The law took effect on January 1, 2004. The Can Spam Act allows courts to set damages of up to $2 million when spammers break the law. Federal district courts are allowed to send spammers to jail and/or triple the damages if the violation is found to be willful. The Can Spam Act requires that businesses: Clearly label commercial e-mail as advertising Use a truthful and relevant subject line Use a legitimate return e-mail address Provide a valid physical address Provide a working opt-out option Process opt-out requests within ten business days The Telecommunications Act of 1996, enacted by the U.S. Congress on February 1, 1996, and signed into law by President Bill Clinton on February 8, 1996, provided major changes in laws affecting cable TV, telecommunications, and the Internet. The law's main purpose was to stimulate competition in telecommunication services. The law specifies: How local telephone carriers can compete How and under what circumstances local exchange carriers (LEC) can provide long-distance services The deregulation of cable TV rates
  5. Gartner’s traditional hype cycle research methodology is used here to track the predominant governmental regulations impacting IT.
  6. California AB 1950 and SB 1386 are two privacy bills, now laws in the State of California, that require organizations to notify Californians if their personal information is disclosed during a security breach. SB 1386 was passed in 2002 to become effective on July 1, 2003. This law is directed at state agencies and businesses operating in California. Personal information is defined as an individual’s first name or first initial and last name with any of the following; • Social Security number, • Driver’s license number or California Identification Card number, or • Account number, credit or debit card number, in combination with something like a PIN or password which would allow access to the account. AB 1950 was passed in 2004, and became effective January 1, 2005. It added medical information to the information to be protected and extended the responsibility to organizations outside of the State, if they collect information about California residents. It does not apply to organizations that are subject to other privacy laws. OFAC – Office of Foreign Assests Control Sarbanes-Oxley (SOX) The U.S. Public Accounting Reform and Investor Protection Act of 2002 requires executives and outside auditors to attest to the effectiveness of internal controls for financial reporting . GLB The Gramm-Leach-Bliley Act (GLB Act), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals . HIPAA The HIPAA Privacy Rule creates national standards to protect the privacy of individuals' medical records and other personal health information and to give patients more control over their health information. Basel II Basel II is a round of deliberations by central bankers from around the world, the goal of which is to produce uniformity in the way banks and banking regulators approach risk management across national borders .
  7. Since its inception, the Data Quality Act has been under attack as a weapon of big business, a stealthy way to keep federal agencies tied in knots over what constitutes sound science But the Bush administration's interpretation of those two sentences could tip the balance in regulatory disputes that weigh the interests of consumers and businesses.
  8. Juran, Joseph M. and A. Blanton Godfrey, Juran's Quality Handbook, Fifth Edition, p. 2.2, McGraw-Hill, 1999.
  9. Organization are processing and storing more and more data every year. Average yearly rate of growth: 125% - large volumes of data interfering with operations (the more data in the operational database, the slower all processes may run) And regulations (as well as business practices) dictate that data once stored, be retained for longer periods of time. - No longer months or years, but in some cases multiple decades More varied types of data are being stored in databases. Not just (structured) characters, numbers, dates & times, but also (unstructured) large text, images, video, and more are being stored. - Unstructured data greatly expands storage needs The retained data must be protected from modification – it must represent the authentic business transactions at the time the business was conducted. - need for better protection from modification - need for isolation of content from changes
  10. OK, now let’s take a closer look at the requirements for data retention. First thing to keep in mind is that laws NEVER say you have to archive data, just that you retain data. So if you can keep it in the operational database, OK. But if not, you have to archive it. Data Archiving is a process used to move data from the operational database to another data store to be kept for the duration of the retention period when it is unacceptable to keep the data in the operational database for that long. So, why might it be unacceptable? - large volumes of data interfering with operations (the more data in the operational database, the slower all processes may run) - need for better protection from modification - need for isolation of content from changes
  11. Here we have some examples of regulations that impact data retention. This is just a sampling of the more than 150 different regulations (at the local, state, national, and international levels) that impact data retention. Regulations Drive Retention and Discovery Source: www. domains.cio.com/symantec/wp/ebs_ ediscovery _ev_wp.pdf
  12. According to Gartner: As the custodians of corporate information systems, IT departments must understand the legal ramifications surrounding the information stored in those systems. Understanding the legal process of discovery as it pertains to electronically stored information is essential.
  13. The regulations dictate the need to retain the data, legal discovery rules dictate how that data must be produced in a court of law. The two work hand-in-hand. Today, most discovery requests are for electronic data, not paper documents. The FRCP changes which took effect in December impact how retained data must be produced for legal purposes. - Most organizations are not prepared to handle an e-discovery request. Requires marriage of IT/business/legal.
  14. OK, so if we have to archive data, how can we go about doing it? Well, there is always bullet number 1. If you can store it in the operational database then you save a lot of work. But it does not work well for large amounts of data or very long retention periods. And the more data in the database the less efficient transaction processing and reporting will be. So we could take a simple approach of using UNLOAD files. But this is not really useful in today’s environment. It assumes the same data schema will be used if you want to ever RELOAD the data (and that is not likely over long periods of time). When they run into audit situations, where they're asked to produce transaction records spanning multiple years, they have to slog through the work of restoring the data. This is a very labor-intensive, manual process. And costly… some sites have spent hundreds of thousands of dollars to respond to audit requests when they have to resort to such manual data restoration. It might be feasible for 2 to 3-year timespans, but not 20 or more years. In situation number 3, we consider cloning and moving data. But this has a lot of the same problems as UNLOADing the data. Think about what happens as the database schema changes – and how you’d go about accessing the data? Finally, we come to the proper approach for retaining large amounts of data for long periods of time – database archiving.
  15. Database Archiving is part of a larger topic, namely Data Archiving. There are many types of data that needs to be archived to fulfill regulatory, legal, and business requirements. Perhaps the biggest driver for archiving has been e-mail. At any rate, each type of data requires different archival processing requirements due to its form and nature. What works to archive e-mail is not sufficient for archiving database data, and so on. This diagram depicts the necessary components of a database archiving solution. Starting with the databases down the left side is the Extract portion, and up the right side is the data recall portion. Several sites have been very vocal about needing this capability, but I think it is a dubious requirement. If you can query from the archive recalling data into the operational database is not really a necessity, it it? And what if the operational database changes (e.g. Oracle to SAP)? The whole process requires metadata to operate. You must capture, validate and enhance the metadata to drive the archive process. You need to know the structure of the operational database and the structure of the archive. There is also the case of the metadata about data retention for the archive. This policy-based metadata must be maintained and monitored against the archive, for example, to determine if data needs to be discarded. And, as you can see off to the bottom left we also need to be able to query the archived data. This will not necessarily be the most efficient access because of differences in the metadata over time, but for queries against archived data performance is not a paramount concern. Finally, we will also have on-going maintenance of the archive: security, access audit, administration of the structures (REORG), backup/recovery, etc.
  16. The Forrester Research report from which these clips are taken is titled: “Comprehensive Database Security Requires Native DBMS Features And Third-Party Tools” Published: March 29, 2005
  17. A data breach is an unauthorized disclosure of information that compromises the security, confidentiality, or integrity of personally identifiable information. In other words, it is when your personal information is allowed to be stolen or accessed in unauthorized ways.
  18. The Privacy Rights Clearinghouse began keeping records on February 15, 2005 – the date of the ChoicePoint breach. 230,454,030 total
  19. Sixty-eight percent of companies are losing sensitive data or having it stolen out from under them six times a year, according to new research from the IT Policy Compliance Group. TJX’s massive data loss is just the tip of the iceberg. Almost seven out of 10 companies—68 percent—are losing sensitive data or having it stolen out from under them six times a year, according to new research from the IT Policy Compliance Group. An additional 20 percent are losing sensitive data a whopping 22 times or more per year. The ITPCG is a security and compliance policy industry group that counts among its members the Institute of Internal Auditors, the Computer Security Institute and Symantec.
  20. Forrester Research recently conducted a survey of companies that had experienced a data breach ( Calculating The Cost Of A Security Breach , Apr 10, 2007). The study, as reported this week in Information Week , concludes that the average security breach can cost a company between $90 and $305 per lost record. But coming up with an accurate figure is difficult because of the additional, extenuating circumstances surrounding data breaches. An additional data point comes from the Ponemon Institute 's 2006 study on the cost of a data breach. The highlights of this particular study though showed that the average cost per lost customer record is $182. Or you can use the data loss calculator, which will automatically generate an average cost, and a plus/minus 20% range, for expenses associated with internal investigation, notification/crisis management and regulatory/compliance if the incident were to give rise to a class action claim.
  21. IT Policy Compliance reports that human error is the overwhelming cause of sensitive data loss, responsible for 75 percent of all occurrences. User error is directly responsible for one in every two cases (50 percent) while violations of policy - intended, accidental and inadvertent - is responsible for one in every four cases (25 percent). So what does this mean? Well, my take on the matter is that data is not properly secured to protect it from human error.
  22. One of the ways that DB2 controls access to data is through the use of identifiers (IDs). Four types of IDs exist: Primary authorization ID Generally, the primary authorization ID identifies a process. For example, statistics and performance trace records use a primary authorization ID to identify a process. Secondary authorization ID A secondary authorization ID, which is optional, can hold additional privileges that are available to the process. For example, a secondary authorization ID can be a Resource Access Control Facility (RACF) group ID. SQL ID An SQL ID holds the privileges that are exercised when certain dynamic SQL statements are issued. The SQL ID can be set equal to the primary ID or any of the secondary IDs. If an authorization ID of a process has SYSADM authority, the process can set its SQL ID to any authorization ID. RACF ID The RACF ID is generally the source of the primary and secondary authorization IDs (RACF groups). When you use the RACF Access Control Module or multilevel security, the RACF ID is used directly. Your access to data is controlled by the privileges you have been granted, your ownership of objects, your ability to execute plans & packages, and, as of V8, security labels.
  23. This shows the complete “laundry list” of DB2 group-level authorizations that can be granted. It is sure to confuse an auditor.
  24. One or two IDs are assigned installation SYSADM authority when DB2 is installed. They have all the privileges of SYSADM, plus: DB2 does not record the authority in the catalog. Therefore, the catalog does not need to be available to check installation SYSADM authority. (The authority outside of the catalog is crucial. For example, if the directory table space DBD01 or the catalog table space SYSDBAUT is stopped, DB2 might not be able to check the authority to start it again. Only an installation SYSADM can start it.) No ID can revoke installation SYSADM authority. You can remove the authority only by changing the module that contains the subsystem initialization parameters (typically DSNZPARM). IDs with installation SYSADM authority can also perform the following actions: Run the CATMAINT utility Access DB2 when the subsystem is started with ACCESS(MAINT) Start databases DSNDB01 and DSNDB06 when they are stopped or in restricted status Run the DIAGNOSE utility with the WAIT statement Start and stop the database that contains the ART and the ORT
  25. URL for the sourced quote above: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci991508,00.html
  26. DB2 V8 offers new functions that allow you to encrypt and decrypt data at the column level. Because you can specify a different password for every row that you insert, you can really encrypt data at the “cell” level in your tables. If you use these functions to encrypt your data, be sure to put some mechanism in place to manage the passwords that are used to encrypt the data. Without the password, there is absolutely no way to decrypt the data. To assist you in remembering the password, you have an option to specify a hint (for the password) at the time you encrypt the data. The SQL example in the middle of the screen shows an INSERT that encrypts the SSN ( social security number) using a password and a hint. Now, in order to retrieve the row you must use the DECRYPT function supplying the correct password. This is shown in the SELECT statement at the very bottom of the slide. If we fail to supply a password, or the wrong password, the data is returned in an encrypted format that is unreadable. The result of encrypting data using the ENCRYPT function is VARCHAR -- FOR BIT DATA. (CAN SKIP THIS  The encoding scheme of the result is the same as the encoding scheme of the expression being encrypted.) When encrypting data keep the following in mind. The encryption algorithm is an internal algorithm. For those who care to know, it uses Triple DES cipher block chaining (CBC) with padding and the 128-bit secret key is derived from the password using an MD5 hash. When defining columns to contain encrypted data the DBA must be involved because the data storage required is significantly different. The length of the column has to include the length of the non-encrypted data + 24 bytes + number of bytes to the next 8 byte boundary + 32 bytes for the hint. The decryption functions (DECRYPT_BIT, DECRYPT_CHAR, and ECRYPT_DB) return the decrypted value of the data. You must supply the encrypted column and the password required for decryption. The decryption functions can only decrypt values that are encrypted using the DB2 ENCRYPT function. Some additional details on encryption are provided on slide 79 but let’s go on to slide 80 now. --- You may have noticed that there is one encryption function but three decryption functions. The result of the function is determined by the function that is specified and the data type of the first argument. The next slide provides details that you can review later. Let’s go on to slide 80. --- Built-in functions for encryption and decryption require cryptographic hardware in a cryptographic coprocessor, cryptographic accelerator, or cryptographic instructions. You must also have the z/OS Cryptographic Services Integrated Cryptographic Service Facility (ICSF) software installed. --- [[Encrypted data can be decrypted only on servers that support the decryption functions that correspond to the ENCRYPT_TDES function. Therefore, replication of columns with encrypted data should only be to servers that support the decryption functions.
  27. But DB2 9 for z/OS also improves support for encryption of data in transit. DB2 9 supports the Secure Socket Layer (SSL) protocol by implementing the z/OS Communications Server IP Application Transparent Transport Layer Security (AT-TLS) function. The z/OS V1R7 Communications Server for TCP/IP introduces the AT-TLS function in the TCP/IP stack for applications that require secure TCP/IP connections. AT-TLS performs transport layer security on behalf of the application, in this case DB2 for z/OS, by invoking the z/OS system SSL in the TCP layer of the TCP/IP stack. The z/OS system SSL provides support for TLS V1.0, SSL V3.0, and SSL V2.0 protocols. So encryption of data over the wire is improved in z/OS 1.7. The Communications Server supports AT-TLS, which uses SSL data encryption. Now SSL encryption has been available on z/OS for a long time, but now DB2 9 for z/OS makes use of this facility and offers SSL encryption using a new secure port. When acting as a requester, DB2 for z/OS can request a connection using the secure port of another DB2 subsystem. When acting as a server, and from within a trusted context (I’ll discuss trusted context in a later DB2portal blog entry), SSL encryption can be required for the connection.
  28. Auditing helps to answer questions like “Who changed data?” and “When was the data changed?” and “What was the old content was prior to the change?” Your ability to answer such questions is very important for regulatory compliance. Sometimes it may be necessary to review certain audit data in greater detail to determine how, when, and who changed the data.
  29. FYI I’ve added this slide in the Auditing section it’s from Guardium give me an opening to plug their name and neon.
  30. Auditing tools should not only capture and present to you the audit data, but they should also alert you on activities and quickly identify records that are needed for an audit.
  31. Limitations of the audit trace The audit trace does not record everything, as the following list of limitations indicates: Auditing takes place only when the audit trace is on. The trace does not record old data after it is changed (the log records old data). If an agent or transaction accesses a table more than once in a single unit of recovery, the audit trace records only the first access. The audit trace does not record accesses if you do not start the audit trace for the appropriate class of events. The audit trace does not audit some utilities. The trace audits the first access of a table with the LOAD utility, but it does not audit access by the COPY, RECOVER, and REPAIR utilities. The audit trace does not audit access by stand-alone utilities, such as DSN1CHKR and DSN1PRNT. The trace audits only the tables that you specifically choose to audit. You cannot audit access to auxiliary tables. You cannot audit the catalog tables because you cannot create or alter catalog tables.
  32. The log is the database – the database tables are just optimized access paths to the current state of the log. And is all your audit trail being written to write-once media, so that it can't be manipulated to hide the culprit's tracks?
  33. Using the log can be useful to confirm approved modifications and identify unauthorized changes. The log can show o bject changes that might affect financial reporting, unauthorized transactions (Who? What? Detect, report, and correct . . .) And it has the additional benefits of not requiring additional hardware and potentially being able to ensure SQL-based data recoverability. But, some companies may discover that scanning the entire log with any of the currently available anaylzers could take more than 24 hours (think about large data sharing groups). I think we should work to charge the scanning costs to the accounting department, including the hardware upgrades that will undoubtedly be necessary to support such an enormous process. It might bring some sanity to the discussion.
  34. Data Access Auditing: Data access auditing is a surveillance mechanism that watches over access to all sensitive information contained within the database. This mechanism brings only the suspicious activity to the auditor’s attention. As was previously discussed, databases generally organize data into tables containing columns. Access to the data generally occurs through a language called Structured Query Language or SQL (Richardson 2). The perfect data access auditing solution would address the following six questions: Who accessed the data? When? Using what computer program or client software? From what location on the network? What was the SQL query that accessed the data? Was it successful; and if so, how many rows of data were retrieved? The auditor can choose to either audit within the client, audit within the database, or audit between the client and the database
  35. The first area that can help protect your organization from a data breach is data masking.
  36. Objective Summary: Changes made to the data structures must be done using an authorized process. All impacts and deltas are tracked and reported to ensure that there are no unauthorized changes that could invalidate the financial reporting systems Solution Summary: Workflow and task approval process Track all changes to data structures and catch those that are made outside of the authorized change approval process Produce delta of changes between releases to provide complete summary of data structure changes for compliance reporting
  37. SOX requirements for Database Change Management in plain English: Changes to the database are widely communicated, and their impacts are known beforehand. Installation and maintenance procedure documentation for the DBMS is current. Data structures are defined and built as the designer intended them to be. Data structure changes are thoroughly tested. Users are apprised, and trained if necessary, when database changes imply a change in application behavior. The table and column business definitions are current and widely known. The right people are involved throughout the application development and operational cycles. Any in-house tools are maintained and configured in a disciplined way. Application impacts are known prior to the migration of database changes to production. Performance is maintained at predefined and acceptable levels. The database change request and evaluation system is rational. Turn-around time on database changes is predictable. Any change to the database can be reversed. Database structure documentation is maintained. Database system software documentation is maintained. Migration through development, test, and especially, production environments is rational. Security controls for data access is appropriate and maintained. Database reorganizations are planned to minimize business disruption.
  38. It is possible to develop a process using change management tools to automatically track all structure changes to the database using the change auditing and comparison features of such tools. By capturing all deltas between successive upgrades/changes, a record of what changed and when is available to the auditors. Catalog/dictionary visibility tools offer the ability to keep a complete log all database change activity performed by DBAs/developers.
  39. Data must be categorized to ensure that it is treated appropriately for regulatory compliance. The who, what, where, when, and why for each piece of data is what determines how that data is governed: Audit, Protection, Retention, etc. So, metadata increases in importance!
  40. Containers versus Content (we break down the content side further on the next slide)
  41. Increasing governmental regulations will cause DBAs to become more business focused as the are drafted to support compliance efforts. Regulations, IMHO, are a good thing. Sometimes they can cause people & companies to do things that they never would’ve done in the first place. SEAT BELTS example (they didn’t even exist, then no one used them, then law passed, now people are afraid of a $50 citation so they use them – wouldn’t you think fear of death would be worse than fear of losing $50? Evidently not.) Additionally, inter-organization communication will be imperative. More interaction with business users is a must, and DBAs are accepting of this. But more interaction with the legal department will also be needed. How often do DBAs do that today? Almost never – only when they need a contract approved.