COMWISE INTERNETWORK PROFILE <ul><li>Establised in 1997 </li></ul><ul><li>Specialised in network infrastructure and securi...
<ul><li>SQL injection has replaced cross-site scripting as the #1 vulnerability </li></ul><ul><li>New attacks leverage aut...
 
 
DDL = Data Definition Language (aka schema changes) DML = Data Manipulation Language (data value changes) DCL = Data Contr...
 
 
 
<ul><li>Complex environments </li></ul><ul><li>Multiple access paths </li></ul><ul><li>Firewalls, IDS/IPS can’t prevent tr...
 
 
Supported Databases Supported Platform Supported Versions Oracle 8i, 9i, 10g, 11g Microsoft SQL Server 2000, 2005, 2008 IB...
S-TAP Supported Platforms OS Type Version 32-Bit & 64-Bit AIX 5.1, 5.2, 5.3, 6.1 Both HP-UX 11.00, 11.11, 11.31 Both 11.23...
Critical  Data Infrastructure Audit & Report Assess & Harden Discover & Classify Monitor  &  Enforce
<ul><li>Preventing attacks </li></ul><ul><li>Identifying unauthorized access </li></ul><ul><li>Blocking privileged users f...
Application Server 10.10.9.244 Database Server 10.10.9.56
Rogue users know what they’re looking for, but... SQL injection leads  to  SQL errors ! Guardium: 100% visibility with rea...
Identify failed login attempts using the application account! Take Action :  Send alert via email, SYSLOG, SNMP or custom ...
Should my customer service rep view 99 records in an hour? Is this normal? What did he see?
Alert  on any login using the application account sourced from a location other than the application! Application Server 1...
<ul><li>Issue:  App server uses generic service account to access DB -- which doesn’t identify WHO initiated transaction (...
<ul><li>How do you track users who 'switch' accounts (perhaps to cover their tracks)? </li></ul><ul><ul><li>Native DB audi...
 
 
Upcoming SlideShare
Loading in...5
×

Guardium Presentation

9,145

Published on

Guardium, Enterprise Database Monitoring and Protection Solution

1 Comment
9 Likes
Statistics
Notes
  • We are looking for entry level Gaurdium Consultant for a project @ Chicago. Please contact us @ shiva@texaras.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
9,145
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
1
Likes
9
Embeds 0
No embeds

No notes for slide
  • External Threats May/June 2008 SQL Injection attacks peaked at around 40 thousand. By December 2008 they peaked around 450 thousand SQL injection replaced Cross-site scripting as the #1 attack vector Bad Guys are spreading the word on HOW to attack systems and they’re making it easier for others to do the same! There are toolkits to automate this as well as embed malware into databases to further affect internal systems Can you detect this with your current solutions?
  • And there’s the Compliance Factor You HAVE to do this! SOX, PCI, they require that you CERTIFY that your company is doing this! Who’s reviewing the Data? Who’s making changes to the Data? Do you know how many failed logins or SQL Errors are occuring? How are they happening? Where are they happening? When are they happening? You NEED granular visibility!
  • Complex systems Apps, Database Types Multiple Paths to the data insiders, outsiders, criminals, hackers Privileged Users intentionally or unintentionally compromising data security or integrity Traditional Solutions Can’t help differentiate this traffic Policies Can’t be enforced There’s no visibility – especially with Privileged Users Are you only going to find out AFTER the fact?!
  • How does this look in a Large Distributed Environment? Multiple STAPs and Collectors SGATE – blocking for only the traffic you need to block! zTAP – monitoring MainFrames as well as Distributed platforms Centralized Policy Management Centralized Audit Repository Scalable Auditing millions of transactions Add Collectors when and where needed to handle whatever throughput and auditing requirements you need STAP Agents provide failover and redundancy options
  • Our Solution addresses the full life cycle of Data Security and Compliance. This demo will focus on the top two quadrants, but we have other modules to: discover databases classify data perform vulnerability assessments etc
  • We’ve picked some scenarios to show how our solution can address these issues for you.
  • First Example Your environment has applications connecting to various database servers as well as users connecting directly to these systems You need a solution that can discover and map this for you. This will help you identify malicious users and attacks!
  • Bad guys generate errors hunting for what they’re looking for. SQL injection is a trial by error attack Brute Force attacks are also a trial by error attack. There’s no reason for these errors on your Production Database, especially coming from the DB Account used by your Application Server! 100% Visibility gives you the information you need to know when these attacks are occurring!
  • Let’s show you how to setup a Policy To alert on Failed Logins We have very granular capabilities We can focus on the Production Database Servers As well as the Application Database account Looking for Failed Logins We can then send alerts via standard SMTP, SNMP, SYSLOG, even allow you to write custom Java applications You get send these alerts to your SIM/SEM!
  • Another Example Traditional Solutions can’t identify suspicious behavior within legitimate traffic Joe is viewing an abnormally high number of customer information! We can even take a look at what he saw! Notice that the audit information is masked, so that someone viewing these reports doesn’t also see the customer information that we’re auditing Joe for… Knowing what was breached and to what extent is what we’re looking for! Native logs won’t give you this information!
  • Another Example of Insider Threat How do you know and handle someone misusing credentials? Application Developers may be able to login using the account that the Application itself uses, but without all of the pesky security measures built into the application! We can create a rule that looks at the traffic going to the Production Database Servers, using the Application Account, but coming from somewhere other than the Application Server! Alerting on this activity – we can even see WHAT was executed and from WHERE! The Database doesn’t care where you are logging in from, so long as you know the right username and password!
  • Identifying fraud or Application Mis-Use You need a solution that shows WHO did WHAT! Native Auditing solutions and logging tools, don’t show this depth Track access back to the application user associated with a specific command Deterministically – not by ‘best guess’! Whatever middleware you are using! And with NO changes to the application or the database!
  • Do you have Privileged Users that use both generic DB accounts as well as generic OS accounts? In many companies, users login with their OS account and then switch to a shell account that has the needed environment to access the database. If they also use a generic database account, how do you track them back?! Joe’s bumping his bonus! Native auditing will only show you the DB Username Other monitoring solutions can only show you the OS shell account that was used! You need everything!
  • Thanks for sitting through the presentation!
  • Guardium Presentation

    1. 2. COMWISE INTERNETWORK PROFILE <ul><li>Establised in 1997 </li></ul><ul><li>Specialised in network infrastructure and security solution </li></ul><ul><li>We representing the following solution: </li></ul><ul><ul><li>Guardium – Enterprise Database Monitoring and Protection Solution </li></ul></ul><ul><ul><li>ObserveIT – Record and Replay User Activities on Server </li></ul></ul><ul><ul><li>netForensics – Centralized log aggregation, management correlation, normalization and reporting system </li></ul></ul>
    2. 3. <ul><li>SQL injection has replaced cross-site scripting as the #1 vulnerability </li></ul><ul><li>New attacks leverage automated toolkits; embed malware in databases </li></ul><ul><li>&quot;The bad guys are getting in and not being detected.” -- IBM </li></ul>
    3. 6. DDL = Data Definition Language (aka schema changes) DML = Data Manipulation Language (data value changes) DCL = Data Control Language
    4. 10. <ul><li>Complex environments </li></ul><ul><li>Multiple access paths </li></ul><ul><li>Firewalls, IDS/IPS can’t prevent traffic that appears to be legitimate </li></ul><ul><li>Most organizations have formal data security policies but ... </li></ul><ul><ul><li>No practical enforcement mechanisms </li></ul></ul><ul><ul><li>No visibility into what’s really going on -- especially with privileged users </li></ul></ul>Web and Application Servers DMZ Networks Criminals Hackers Privileged Users
    5. 13. Supported Databases Supported Platform Supported Versions Oracle 8i, 9i, 10g, 11g Microsoft SQL Server 2000, 2005, 2008 IBM DB2 for LUW (Linux, Unix, Windows, z/Linux) 9.1, 9.5 IBM DB2 for z/OS 8.1, 9.1 IBM DB2 UDB for iSeries (AS/400) V5R2, V5R3, V5R4, V6R1 IBM Informix 7, 8, 9, 10, 11 Sun MySQL 4.1, 5.0, 5.1 Sybase ASE 12, 15 Sybase IQ 12.6 Teradata 6.01, 6.02
    6. 14. S-TAP Supported Platforms OS Type Version 32-Bit & 64-Bit AIX 5.1, 5.2, 5.3, 6.1 Both HP-UX 11.00, 11.11, 11.31 Both 11.23 PA 32-Bit 11.23 IA64 64-Bit Red Hat Enterprise 2, 3, 4, 5 Both SUSE Linux 9, 10 Both Solaris - SPARC 6, 8, 9, 10 Both Solaris - Intel/AMD 10 Both Tru64 5.1A, 5.1B 64-Bit Windows NT 32-Bit 2000, 2003, 2008 Both
    7. 15. Critical Data Infrastructure Audit & Report Assess & Harden Discover & Classify Monitor & Enforce
    8. 16. <ul><li>Preventing attacks </li></ul><ul><li>Identifying unauthorized access </li></ul><ul><li>Blocking privileged users from access to sensitive data </li></ul><ul><li>Identifying fraud at the application layer (PeopleSoft, SAP, ...) </li></ul><ul><li>Automating sign-offs for change control & compliance processes </li></ul>
    9. 17. Application Server 10.10.9.244 Database Server 10.10.9.56
    10. 18. Rogue users know what they’re looking for, but... SQL injection leads to SQL errors ! Guardium: 100% visibility with real-time alerts … They don’t always know where to find it! Brute force attacks result in failed logins ! IINFORMIX IINFORMIX IINFORMIX IINFORMIX
    11. 19. Identify failed login attempts using the application account! Take Action : Send alert via email, SYSLOG, SNMP or custom Java class Focus on production DB servers
    12. 20. Should my customer service rep view 99 records in an hour? Is this normal? What did he see?
    13. 21. Alert on any login using the application account sourced from a location other than the application! Application Server 10.10.9.244 Database Server 10.10.9.56
    14. 22. <ul><li>Issue: App server uses generic service account to access DB -- which doesn’t identify WHO initiated transaction (connection pooling) </li></ul><ul><li>Solution : Track access to application user associated with specific SQL commands </li></ul><ul><ul><li>Deterministic identification vs. time-based “best guess” </li></ul></ul><ul><ul><li>Out-of-the-box support for all major enterprise apps (Oracle EBS, PeopleSoft, SAP, Siebel, Business Objects, Cognos, etc.) </li></ul></ul><ul><ul><li>Plus custom apps (WebLogic, WebSphere, Oracle AS, etc.) </li></ul></ul><ul><ul><li>No changes to applications </li></ul></ul>Application Server Database Server Joe Marc AppUser
    15. 23. <ul><li>How do you track users who 'switch' accounts (perhaps to cover their tracks)? </li></ul><ul><ul><li>Native DB auditing (& SIEM) tools can't capture original OS user information </li></ul></ul><ul><ul><li>Other monitoring systems only provide OS shell account that was used </li></ul></ul>

    ×